Threat & Attack Simulation
A Crash Course in Hardware Hacking Methodology: The Ones and Zeros
Author: Nathan Keys The Internet-of-Things (IoT) has quickly and seamlessly become woven into the fabric of our daily existence. With […] ...
SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System Discovery
Author: Marshall Price, Senior Security Consultant TL;DR: The following conditions can lead to compromise of the SCCM client push account […] ...
Phishing for Financial Fears
Over the last 4 days (as of the writing of this blog) the federal government has seized the assets of […] ...
Penetration Testing – What’s New in the PCI DSS v4.0
Penetration testing (pen testing) remains largely the same in PCI version 4.0 as it was intended in PCI version 3.2.1, […] ...
Scanning, Testing and Simulating – Where does PTaaS Fit?
Understanding Vulnerability assessment, penetration testing, and attack simulations requires a better understanding of who will be using the results and […] ...