26 April 2023
Our hackers analyzed 388 client projects. Here's what they found.
23 February 2023
Whether you’re probing a web app or mapping out a cloud environment, the right tool makes all the difference. These are our top 10 pentesting picks that help turn theory into (ethical) action.
30 January 2023
While many independently owned repair shops might be completely legitimate operations, there are more and more popping up that can and will hack your mobile phone while repairing it. And the problem is, it’s REALLY easy to do
14 December 2021
Log4Shell (CVE-2021-44228) is one of the most severe and widespread vulnerabilities in recent memory. This article unpacks the threat, the reasons for its rapid spread, and what every security team needs to know.
29 September 2021
Mobile applications: Why they should always be tested on a build without obfuscation, SSL pinning, and root/jb detection.
1 June 2020
How a single simple form submission can be manipulated to gain control of any Virtual Machine (VM) within VMware Cloud Director. The story of a critical vulnerability that enables a full infrastructure takeover.