Microsoft's soft patch didn't kill tenant enumeration. Attackers have new ways to map cloud infrastructure. Learn how modern Azure and Microsoft 365 enumeration techniques work, why they're back, and what defenders should do next.
Resources
All Resources
Library
Explore our collection of resources, including blog articles, webcasts, case studies, and eBooks.
Emerging React and Next.js vulnerabilities (CVE-2025-55182, CVE-2025-66478): what Sprocket Security is seeing, current detection coverage, and guidance for teams.
Discover your internet-facing assets for free with Sprocket ASM Community and upgrade to expert pentesting anytime. No sales friction required.
Infostealers aren't new, but their impact has fundamentally changed. Megan Squire breaks down how infostealer malware has quietly become one of the most prolific engines behind modern cybercrime.
AI isn't creating new cyberattacks. It's making existing ones faster and more scalable. Learn what Anthropic's research really reveals about AI-enabled threats and how organizations can prepare.
Learn how Sprocket’s AI Remediation Assistance turns vague vulnerability findings into clear, actionable fixes.