LATEST POSTS

Blog2022-07-29T17:39:53-04:00

Our team researches and documents bleeding-edge security concepts and hacking techniques.
This blog explores these topics and more to keep you informed.

Are Your Cybersecurity Investments In Tools and Services Paying Off?

By |January 14, 2022|Blog|

Finding, implementing, and supporting cybersecurity tools and services within an organization can be a daunting task for a company of any size. There is no shortage of cybersecurity tools and services available to address just ...

Why Critical Vulnerabilities Like Log4Shell Will Continue to Surface

By |December 14, 2021|Blog|

What is Log4Shell? Log4Shell is a critical vulnerability that affects the Log4J Java logging library (versions 2.14.0 and earlier) bundled into the Apache logging services. The vulnerability allows remote code execution (RCE) by a malicious ...

User Enumeration in a Production Environment – Credential Stuffing 101

By |July 19, 2021|Blog|

Ah yes, credential stuffing! Almost as common as thanksgiving stuffing, yet as distasteful as black Friday shopping. Credential stuffing is especially effective when it’s coupled with user enumeration. The likelihood of user enumeration attacks occurring ...

Go to Top