26 April 2023

Citadelo vulnerability stats 2022

Our hackers analyzed 388 client projects. Here's what they found.

23 February 2023

Top 10 Pentesting Tools Every Ethical Hacker Should Know

Whether you’re probing a web app or mapping out a cloud environment, the right tool makes all the difference. These are our top 10 pentesting picks that help turn theory into (ethical) action.

30 January 2023

2 ways repair shops can hack your mobile phone

While many independently owned repair shops might be completely legitimate operations, there are more and more popping up that can and will hack your mobile phone while repairing it. And the problem is, it’s REALLY easy to do

14 December 2021

CVE-2021-44228: Why Log4Shell Is Still a Critical Threat

Log4Shell (CVE-2021-44228) is one of the most severe and widespread vulnerabilities in recent memory. This article unpacks the threat, the reasons for its rapid spread, and what every security team needs to know.

29 September 2021

Obfuscated Apps Waste Time. Here’s How to Pentest Smarter

Mobile applications: Why they should always be tested on a build without obfuscation, SSL pinning, and root/jb detection.

1 June 2020

Full infrastructure takeover of VMware Cloud Director (CVE-2020-3956)

How a single simple form submission can be manipulated to gain control of any Virtual Machine (VM) within VMware Cloud Director. The story of a critical vulnerability that enables a full infrastructure takeover.