Featured Blog
No Exploits Needed: Using Cisco’s Own Features to Extract Credentials
During a routine internal penetration test, we used nothing more than default settings and built-in router functionality to extract the running configuration from a Cisco device—no credentials required. The result? Access to password hashes, SNMP secrets, and infrastructure details that could enable full network compromise. This isn’t a story about zero-days—it’s a warning about what […]
Pen Testing, Security contols, Security Controls Reports
Top Cybersecurity Control for Q4 2023: Penetration Testing
Incident Response, Zero day exploits
Double Trouble: Understanding Two Cisco Zero Day Vulnerabilities & Guide to Zero Day Attack Response
Business email compromise, Social Engineering
Social Engineering Scams: Cross-Tenant Impersonation Attacks, Voice Cloning Risks, and More
Microsoft Office 365
M365 Security: Leveraging CIS Standards for Optimal Security and Advanced Threat Mitigation
News, Social Engineering
2023 MGM Breach: A Wake-Up Call for Better Social Engineering Training for Employees
Compliance, Cybersecurity Planning, NIST CSF