contact us

Hidden Gems in Windows: The Hunt is On

The process of dumping LSASS (Local Security Authority Subsystem Service) is not a new attack and is well known; however, this specific vector is interesting because all of the tools required to pull this off are already bundled with the Windows operating...

read more

AI Is Changing the Threat Landscape

Vendors are beginning to incorporate artificial intelligence (AI) and machine learning (ML) capabilities into their cybersecurity tools, enabling those tools to do everything, from automating aspects of penetration testing to monitoring...

read more

Use AI to Improve Penetration Testing

The most effective penetration testing methods combine threat intelligence, vulnerability scanning, and human expertise to validate the criticality of vulnerabilities through simulated attacks on an IT environment. Security professionals are now...

read more