FireEye made the news last week for responsibly disclosing an incident to the public in which they themselves were the victim. We wrote up an ... continue reading
Given my experience as a pen tester, bug bounty hunter, and now as a Continuous Attack Surface Testing (CAST) Operator, I’m always fascinated by... continue reading
Dec 10, 2020 5:00:00 AM |
By
Brianne Hughes & Catherine Lu
We’ve just released a major update of cyber.dic, the spell checker add-on specializing in cybersecurity terms. It’s the latest resource to come... continue reading
The breaking news about an attack against FireEye by a nation-state group is ongoing and will continue to develop. We’re not in the business of... continue reading
Nov 23, 2020 6:00:00 AM |
By
Britt Kemp & Jake Miller
Around this time last year, we released a list of our favorite pen testing tools for client engagements and in our own research. This year, we’re... continue reading
Attackers don’t all approach a target in the same way. Often, they’ll target the lowest-hanging fruit or the easiest way to get through your... continue reading
Our third and final installment in a series about cheating at video games. If you haven’t already read Part 1 and Part 2, go ahead and do that... continue reading
In our last segment, we talked about networking design and trust boundaries in video games and web applications. We pick back up with a story... continue reading
For as long as video games have existed, people have been competing to see who is the best. And wherever there is competition, someone will find a... continue reading
Most of the time, vulnerabilities are things that grant attackers superpowers: the ability to read or write arbitrary files to the server... continue reading