Not long ago, an innovative startup company reached out to us with a very specific request – they needed to create a scalable, lightweight program... continue reading
One thing is for sure about 2020: it’s a year that will stick out in our memory for the rest of our lives. Luckily, in spite of many on-site,... continue reading
FireEye made the news last week for responsibly disclosing an incident to the public in which they themselves were the victim. We wrote up an ... continue reading
Given my experience as a pen tester, bug bounty hunter, and now as a Continuous Attack Surface Testing (CAST) Operator, I’m always fascinated by... continue reading
Dec 10, 2020 5:00:00 AM |
By
Brianne Hughes & Catherine Lu
We’ve just released a major update of cyber.dic, the spell checker add-on specializing in cybersecurity terms. It’s the latest resource to come... continue reading
The breaking news about an attack against FireEye by a nation-state group is ongoing and will continue to develop. We’re not in the business of... continue reading
Nov 23, 2020 6:00:00 AM |
By
Britt Kemp & Jake Miller
Around this time last year, we released a list of our favorite pen testing tools for client engagements and in our own research. This year, we’re... continue reading
Attackers don’t all approach a target in the same way. Often, they’ll target the lowest-hanging fruit or the easiest way to get through your... continue reading
Our third and final installment in a series about cheating at video games. If you haven’t already read Part 1 and Part 2, go ahead and do that... continue reading
In our last segment, we talked about networking design and trust boundaries in video games and web applications. We pick back up with a story... continue reading