Jun 25, 2025
Sipping from the CVE Firehose: How We Prioritize Emerging Threats for Real-World Impact
By Nate Robb
Jun 18, 2025
2025 Red Team Tools – Cloud & Identity Exploitation, Evasion & Developer Libraries
By Bishop Fox
Jun 04, 2025
2025 Red Team Tools – C2 Frameworks, Active Directory & Network Exploitation
By Bishop Fox
Apr 24, 2025
SonicWall Sonicos Versions 7.1.x and 8.0.x
By Jon Williams
Apr 16, 2025
The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel
By Rob Ragan
Mar 31, 2025
Epic Fails and Heist Tales: A Red Teamer’s Journey to Deadwood
By Alethe Denis
Subscribe to our blog and advisories
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Mar 24, 2025
Rust for Malware Development
By Nick Cerne
Mar 21, 2025
SonicWall-CVE-2024-53704: Exploit Details
By Jon Williams
Mar 18, 2025
Tomcat CVE-2025-24813: What You Need to Know
By Jon Williams
Feb 24, 2025
Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware
By Jon Williams
Feb 10, 2025
SonicWall CVE-2024-53704: SSL VPN Session Hijacking
By Jon Williams
Feb 05, 2025
From Dial Tone to Throne: IVR Testing in the Spirit of The King of NYNEX
By Alethe Denis
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.