Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - Cody Florek, Director of Information Security Operations at Sentry
May 06, 2025 Sprocket Security

Ahead of the Breach - Cody Florek, Director of Information Security Operations at Sentry

Cody explains why context is critical — a vulnerability on an isolated batch server requires different attention than one affecting your entire infrastructure.
How Spear Phishing Attacks Work and 8 Ways to Prevent Them
May 01, 2025 Sprocket Security

How Spear Phishing Attacks Work and 8 Ways to Prevent Them

Spear phishing is a targeted email attack that appears personalized and legitimate to an individual.
A Love Letter to Nmap
Apr 24, 2025 Topher Lyons

A Love Letter to Nmap

A tool that can scan remote endpoints and provide details on if a host is live and what open ports and services exist on the host. In this blog, I’ll explore some unique and more advanced ways to use Nmap that will make you fall even more in love with the tool.
Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor
Apr 22, 2025 Sprocket Security

Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor

Ayyappan Rajesh, Offensive Security Engineer at Block Harbor Cybersecurity, takes Casey deep into the technical underbelly of wireless security testing in this illuminating episode of Ahead of the Breach.
Continuous Penetration Testing vs. Automated Scanning: Why the Human Element Still Matters
Apr 17, 2025 Lindsay Drozdik

Continuous Penetration Testing vs. Automated Scanning: Why the Human Element Still Matters

Automation is great at scanning for vulnerabilities. But supplementing automation alongside human testers actually strengthens your security posture.
Ahead of the Breach - Eyal Paz, VP of Research at OX Security
Apr 09, 2025 Sprocket Security

Ahead of the Breach - Eyal Paz, VP of Research at OX Security

Introducing security into development pipelines is walking a tightrope — one false step can turn developers against your security program.
1 2 3 4 5 »