Security Practitioner
Filter Content:
Categories:
Tags:
May 13, 2022 | Video
Noah King, Brad Hong, and Jake Murphy were back at it again with this third installment of 'The Attackers Journey'.…May 10, 2022 | Blogs
It took just two days for a pair of researchers from Horizon3.ai to discover exploits for the new F5 BIG-IP…May 9, 2022 | Attack Blogs
F5 recently patched a critical vulnerability in their BIG-IP iControl REST endpoint CVE-2022-1388. This vulnerability particularly worrisome for users because…April 17, 2022 | Whitepapers
SANS First Look: New technologies are emerging to help provide more consistent, repeatable pen tests that mimic real-world attack techniques.March 29, 2022 | Video
This series centers around how to be an ethical hacker and the steps/processes to get there. In part 2, topics…February 28, 2022 | Video
Join us in side-saddling on an attacker’s journey with Noah King to become an ethical hacker!January 6, 2022 | Attack Blogs
Log4Shell is a "once-in-a-decade" type of vulnerability that will linger in environments for years to come. For a vulnerability with…December 10, 2021 | Attack Blogs
Understanding Log4Shell: the Apache log4j2 Remote Code Execution Vulnerability (CVE-2021-44228)November 18, 2021 | Whitepapers
This Red vs. Blue approach to cybersecurity is unsustainable, and often does more harm than good. The goal should be…November 9, 2021 | Disclosures
During our assessment of the ResourceSpace code base, we found three new vulnerabilities that could be exploited by an unauthenticated…