Cybersecurity
Resources Blog

Cybersecurity

Keep up to date with the latest offensive security news, knowledge, and resources.
Continuous PTaaS: What It Is, Why It Matters, and What to Look For
Apr 08, 2026

Continuous PTaaS: What It Is, Why It Matters, and What to Look For

PTaaS improved how testing is delivered. Continuous PTaaS improves security outcomes. Learn what your program needs to actually reduce risk over time.
Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.
Apr 02, 2026

Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.

The Axios supply chain attack exposed why dependency scanning fails against credential compromise. Learn how attackers backdoor popular packages and what your penetration tests are missing.
The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed
Mar 30, 2026

The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed

Four botnets. Three million devices. The same IoT vulnerabilities security teams have deprioritized for years. What defenders keep getting wrong.
Why Your EHR Vendor’s Security Is Your Compliance Problem
Mar 12, 2026

Why Your EHR Vendor’s Security Is Your Compliance Problem

Your EHR vendor’s security gap is your HIPAA liability. Learn how third-party health IT risk exposes covered entities and what a mature vendor risk program requires.
Why Connected Medical Devices Are Your New Perimeter
Mar 06, 2026

Why Connected Medical Devices Are Your New Perimeter

53% of connected medical devices have critical vulnerabilities. Learn how attackers and exploit IoT blind spots in healthcare networks and how to close them.
What OCR Investigators Look for After a Breach
Mar 04, 2026

What OCR Investigators Look for After a Breach

Learn what HHS OCR investigators look for after a HIPAA breach and how continuous penetration testing builds the audit trail that proves your security programs works.
1 2 3 4 5