Prescient SecurityBlueKeep: A Novel Approach to Remote Code ExecutionOn May 14th, Microsoft surprised many security experts by announcing a patch for Windows XP, Windows 7, Server 2003, Server 2008, and…Jun 21, 2019Jun 21, 2019
Prescient SecurityCan Your Coffee Hack You?Hacking and the rise of the QR codeJun 11, 2019Jun 11, 2019
Prescient SecurityThe Elegance of SimplicityInsights into the Mind of a Security ProfessionalJun 11, 2019Jun 11, 2019
Prescient SecurityUSING HUNT / BURP SUITE TO ASSIST IN MANUAL TESTING AND METHODOLOGAUTHOR: STEVE SEIDEMAN, CISSPMay 29, 2019May 29, 2019
Prescient Security3 Major Considerations for Businesses Hiring a Cyber Security CompanyHiring a cyber security company can be a challenging endeavor. As with any highly technical field, it can be hard for consumers to…May 24, 2019May 24, 2019
Prescient SecurityBeing Compliant isn’t always Being SecureI’m Compliant, so that means I’m Secure, right?May 17, 2019May 17, 2019
Prescient SecurityAbuse for Fun and Profit — Windows Dynamic Data Exchange Protocol:During a recent Application Security Assessment, I came across an interesting insecurity that oftentimes analyst may overlook. The…May 15, 2019May 15, 2019
Prescient Security6 Things Every Security Assessment Report Should IncludeReport writing is a critical component of a cyber security assessment. The technical report communicates a point in time collection of the…May 15, 2019May 15, 2019
Prescient SecurityThree Things That Can Slow Down Your Penetration TestPenetration tests often have tight deadlines in order to meet budget, compliance, and other regulatory goals.May 15, 2019May 15, 2019
Prescient SecurityPrivilege Escalation Flaw Found in GoPro Fusion Studio 1.2Summary: GoPro HackedMay 14, 2019May 14, 2019