BlueKeep: A Novel Approach to Remote Code ExecutionOn May 14th, Microsoft surprised many security experts by announcing a patch for Windows XP, Windows 7, Server 2003, Server 2008, and…Jun 21, 2019Jun 21, 2019
USING HUNT / BURP SUITE TO ASSIST IN MANUAL TESTING AND METHODOLOGAUTHOR: STEVE SEIDEMAN, CISSPMay 29, 2019May 29, 2019
3 Major Considerations for Businesses Hiring a Cyber Security CompanyHiring a cyber security company can be a challenging endeavor. As with any highly technical field, it can be hard for consumers to…May 24, 2019May 24, 2019
Being Compliant isn’t always Being SecureI’m Compliant, so that means I’m Secure, right?May 17, 2019May 17, 2019
Abuse for Fun and Profit — Windows Dynamic Data Exchange Protocol:During a recent Application Security Assessment, I came across an interesting insecurity that oftentimes analyst may overlook. The…May 15, 2019May 15, 2019
6 Things Every Security Assessment Report Should IncludeReport writing is a critical component of a cyber security assessment. The technical report communicates a point in time collection of the…May 15, 2019May 15, 2019
Three Things That Can Slow Down Your Penetration TestPenetration tests often have tight deadlines in order to meet budget, compliance, and other regulatory goals.May 15, 2019May 15, 2019
Privilege Escalation Flaw Found in GoPro Fusion Studio 1.2Summary: GoPro HackedMay 14, 2019May 14, 2019