WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Vulnerabilities (11)

From SSRF to Port Scanner

March 18, 2019
Est Read Time: 4 min
How to convert a SSRF vulnerability into a Port Scanner
Vulnerabilities

.git — The Hidden Danger

December 4, 2017
Est Read Time: 2 min
Git is great versioning system that I am actively using while doing some development.
Cobalt Core Vulnerabilities

Kerberoast Attack Techniques

November 1, 2017
Est Read Time: 5 min
In this blog we will focus on Kerberoast attack techniques (Old Technique and New Technique).
Vulnerabilities

Spear Phishing with Go Phish Framework

October 17, 2017
Est Read Time: 5 min
What is Spear Phishing?
Cobalt Core Vulnerabilities

UX-Friendly Enumeration Protection in Ruby on Rails

May 23, 2017
Est Read Time: 4 min
How to avoid revealing the existence of records to attackers in web applications, while keeping a good user experience...
Cobalt Core Vulnerabilities

How to Write a Great Vulnerability Assessment Report with this Template

September 28, 2016
Est Read Time: 7 min
David Sopas shares his advice on writing a high-quality vulnerability assessment report.
Vulnerabilities