Our team researches and documents bleeding-edge security concepts and hacking techniques.
This blog explores these topics and more to keep you informed.
NTLM vs Kerberos Authentication Processes
What are authentication protocols? An authentication protocol is a method used by a server to verify the authenticity of a request, typically ensuring that the user is valid. There are many different authentication protocols; however, ...
Getting Started With CTFs
If you're interested in getting into cybersecurity, try gamifying the experience and familiarize yourself with concepts and tools by joining CTFs! What are CTFs? Capture-the-Flag events are primarily online competitions where teams solve challenges to ...
Domain Admin Utilizing ADCS (ESC1 & ESC8)
Active Directory Certificate Services (ADCS) is also known as "privilege escalation as a service." ADCS is a service provided with Active Directory that issues certificates for machines and services within a Windows environment, and ...
AppSec as a Service vs. Traditional Pen Testing: A Cost-Savings Comparison
Introduction Are you overpaying for application security? In today’s landscape, keeping your apps secure is crucial. This article compares AppSec as a Service (ASaaS) with traditional pen testing, showing how ASaaS can boost your security ...
The Strategic Advantage of AppSec as a Service for SaaS Product Development
Introduction Keeping your application safe while moving at startup speeds can be tough. This article explores the benefits of using Application Security as a Service (AppSec as a Service) for SaaS product development. We'll show ...
Attacks You Should Know About: Cross-Site Request Forgery
Welcome to the first installment of "Attacks You Should Know About!" In this series of blogs, we will cover a variety of web application attacks that are fundamental for web application penetration testers to ...
Ensuring SaaS Compliance with Application Security as a Service (ASaaS)
Introduction Managing regulatory compliance is a significant challenge for SaaS platforms. Product Owners and CTOs must balance these demands with operational efficiency. This article explores how Application Security as a Service (ASaaS) can address these ...
Evaluating AppSec Solutions for SaaS: What You Need to Know Before Deciding
Introduction Given that most online security incidents are caused by human error, it's evident that protecting your platform requires more than advanced technology; it demands effective strategies that your entire team can implement. This guide ...
Agile Security: Incorporating Strong Security Practices in SaaS Development Cycles
Introduction As a SaaS founder, you face the constant challenge of developing fast while keeping your applications secure. Balancing speed and security is tough but essential in today's tech landscape. This article dives into Agile ...