Featured Blog
No Exploits Needed: Using Cisco’s Own Features to Extract Credentials
During a routine internal penetration test, we used nothing more than default settings and built-in router functionality to extract the running configuration from a Cisco device—no credentials required. The result? Access to password hashes, SNMP secrets, and infrastructure details that could enable full network compromise. This isn’t a story about zero-days—it’s a warning about what […]
Cybersecurity, Cybersecurity Planning
What’s Hot in Cybersecurity? Recapping the Top 2023 Cybersecurity Trends from Black Hat, DEFCON, and BSides
Cyberattacks, Cybersecurity
2023 Cyberattack Trends: Zero-Day Attacks, Virtualization Vulnerabilities & More
Attack Surface Monitoring, Cybersecurity, Security Controls Reports
Q3 2023 Top Cybersecurity Control: Attack Surface Monitoring
Cybersecurity Planning, Risk Assessments
How to Ensure Your Cybersecurity Risk Assessment Results are Actionable
Cybersecurity Planning, Risk Assessments
How to Measure Cybersecurity Risk: The Secret to Getting the Maximum Value From a Risk Assessment
Web application security
Web App Pentesting: A 7-Step Checklist for Uncovering Hidden Vulnerabilities
Cybersecurity, Cybersecurity leadership, Cybersecurity Planning, Resource, Security Controls Reports, vCISO