Featured Tech
Ruby Vulnerabilities: Exploiting Dangerous Open, Send and Deserialization Operations
Apr 19, 2022
Our Top 9 Favorite Fuzzers
By Britt Kemp
Apr 05, 2022
Nuclei: Packing a Punch with Vulnerability Scanning
By Matt Thoreson David Bravo Zach Zeitlin Sandeep Singh
Find Out First
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Mar 22, 2022
Reports from the Field: Part 3
By Wes Hutcherson
Mar 08, 2022
Reports from the Field: Part 2
By Wes Hutcherson
Mar 01, 2022
Reports from the Field: Part 1
By Wes Hutcherson
Feb 15, 2022
Never, Ever, Ever Use Pixelation for Redacting Text
By Dan Petro
Jan 13, 2022
Creating an Exploit: SolarWinds Vulnerability CVE-2021-35211
By Carl Livitt
Jan 11, 2022
Zero-Day Collaboration: Working With Imperva to Eliminate a Critical Exposure
By Carl Livitt
Dec 27, 2021
How Bishop Fox Has Been Identifying and Exploiting Log4shell
By Dan Petro
Dec 06, 2021
XMPP: An Under-appreciated Attack Surface
By Zach Julian
Nov 15, 2021
Eyeballer 2.0 Web Interface and Other New Features
By Dan Petro
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.