Find the latest Webinar content from the Sprocket Testing Team.
Resources
All Resources

Library

Explore our collection of resources, including blog articles, webcasts, case studies, and eBooks.
AI Is Accelerating Attacks, Not Reinventing Them: What Anthropic’s Research Really Tells Us
Nov 20, 2025

AI Is Accelerating Attacks, Not Reinventing Them: What Anthropic’s Research Really Tells Us

AI isn't creating new cyberattacks. It's making existing ones faster and more scalable. Learn what Anthropic's research really reveals about AI-enabled threats and how organizations can prepare.
Closing the Gap Between Finding and Fix: Introducing AI Remediation Assistance
Nov 13, 2025

Closing the Gap Between Finding and Fix: Introducing AI Remediation Assistance

Learn how Sprocket’s AI Remediation Assistance turns vague vulnerability findings into clear, actionable fixes.
What’s New in OWASP 2025: Configuration Drift, Supply Chain Risk, and Continuous Testing
Nov 13, 2025

What’s New in OWASP 2025: Configuration Drift, Supply Chain Risk, and Continuous Testing

OWASP’s 2025 Top 10 shows how security misconfigurations and software supply chain issues dominate. Here’s how continuous pentesting closes the gap.
Continuous Penetration Testing: Closing the Gaps Between Threat and Response
Oct 23, 2025

Continuous Penetration Testing: Closing the Gaps Between Threat and Response

No slides. No sales pitches. Just real talk about how security leaders evaluate, select, and justify security solutions.
The Pentester Rotation Myth
Oct 14, 2025

The Pentester Rotation Myth

Rotating pentesters every year may sound like getting “fresh eyes,” but it often resets progress and weakens security maturity. Learn why continuity-based penetration testing, anchored in frameworks like MITRE ATT&CK and iterative feedback loops, drives deeper insight, faster remediation, and stronger defenses over time.
A Day in the Life of a Vulnerability Researcher — LADSPA
Oct 07, 2025

A Day in the Life of a Vulnerability Researcher — LADSPA

Follow a vulnerability researcher’s deep dive into FFmpeg’s LADSPA plugin loader and the discovery of CVE-2025-60616 — a logic flaw in how environment variables are trusted. Learn how this vulnerability enables code execution, why fuzzing missed it, and how proper validation and process isolation can prevent similar exploits.
3 4 5 6 7