Nov 30, 2016
A Guide to Do-It-Yourself Network Segmentation
By Cory Johnson
Aug 10, 2016
Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player
By Dan Petro
Apr 08, 2016
If You Can't Break Crypto, Break the Client: Recovery of Plaintext iMessage Data
By Joe DeMesy, Shubham Shah, and Matthew Bryant
Feb 03, 2016
Burp, Collaborate, and Listen: A Pentester Reviews the Latest Burp Suite Addition
By Max Zinkus
Oct 07, 2015
Fishing the AWS IP Pool for Dangling Domains
By Matt Bryant
Sep 23, 2015
Stand Your Cloud #2: Host Server Hardening
By Trevor Lawrence & Ruihai Fang
Sep 08, 2015
The Active Directory Kill Chain: Is Your Company at Risk?
By Kevin Sugihara
Aug 27, 2015
ColdFusion Bomb: A Chain Reaction From XSS to RCE
By Shubham Shah
Aug 17, 2015
An Overview of BGP Hijacking
By Zach Julian
Jul 28, 2015
On the "Brink" of a Robbery
By Dan Petro
May 04, 2015
Rethinking & Repackaging iOS Apps: Part 2
By Carl Livitt
Apr 18, 2015
Vulnerable by Design: Understanding Server-Side Request Forgery
By Mike Brooks
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.