A collaboration between Timehop and Bishop Fox. Download the PDF version here Fresh off the July 4th holiday, news broke that popular social media aggregator Timehop had been breached. Potentially …

Read Story

Avoid Common Mistakes When Deploying Cloud-based Services Download the full PDF guide here The Threat of Poor AWS S3 Buckets Security If your organization uses Amazon Web Services (AWS), it …

Read Story

Recently, the Wi-Fi Alliance officially announced details for the WPA3 security standard, which includes a brand-new protocol: the “Enhanced Open” network. While this new technology will represent an improvement to …

Read Story

Over the past year, I came across two server-side attack vectors based on CSV injection (explained well here). The first case shows an instance of data exfiltration via Google Sheets …

Read Story

Our newest revision, Version 1.1, is now available: (Version 1.1) How do you pronounce SQL? Should you write denial of service with hyphens? Is it pen testing or pentesting? In …

Read Story

EPISODE ONE: THE CTF AWAKENS Each and every December, some of the best and brightest hackers from around the world travel to Washington D.C. for the NetWars Tournament of Champions …

Read Story

If you've been following our actions on social media lately, you'll notice we did a "12 Days of Security" series of cybersecurity tips for how to stay secure around the …

Read Story

This blog post is the closing chapter in a series about AWS security best practices. Read the first post and second post in this series for context. In cloud environments, policies, …

Read Story

You May Also Like

Subscribe by Email