Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Essential

Keep up to date with the latest offensive security news, knowledge, and resources.
AI for Defenders: What's Actually Working in the Environments We Test
May 13, 2026

AI for Defenders: What's Actually Working in the Environments We Test

From alert triage to attack path prioritization, AI has moved past the marketing slides. A Sprocket SE breaks down what's working in real SOC workflows, where it falls short, and how to think about automation before it thinks for you.
Auditing AI Chat APIs: Beyond Prompt Injection
May 07, 2026

Auditing AI Chat APIs: Beyond Prompt Injection

Prompt injection isn't the only risk in AI chat APIs. See how we found a GraphQL BOLA in a healthcare SaaS AI assistant and why the transport layer matters.
Top 10 CPTaaS Companies in 2026: The Definitive Guide
May 01, 2026

Top 10 CPTaaS Companies in 2026: The Definitive Guide

Explore the top 10 CPTaaS companies in 2026. Compare continuous penetration testing platforms, PTaaS providers, ASM capabilities, compliance support, and human-led testing models.
Ahead of the Breach - Gary Lobermier, Lead Adversarial Security Engineer at Northwestern Mutual
May 01, 2026

Ahead of the Breach - Gary Lobermier, Lead Adversarial Security Engineer at Northwestern Mutual

Gary Lobermier of Northwestern Mutual on building purple team automation that validates hundreds of MITRE ATT&CK techniques daily.
Self-Propagating XSS: When Widget Frameworks Become Worm Vectors in Multi-Tenant Platforms
Apr 29, 2026

Self-Propagating XSS: When Widget Frameworks Become Worm Vectors in Multi-Tenant Platforms

Discover how a self-propagating XSS worm exploits multi-tenant widget frameworks to autonomously spread across enterprise applications using legitimate API calls, bypassing CSP, evading audit trails, and surviving password changes.
Hook, Line, and Server
Apr 23, 2026

Hook, Line, and Server

MFA doesn't stop session cookie replay. Endpoint detection doesn't catch fileless malware without behavioral analysis. Here's the full post-phishing kill chain and what actually stops it.