Tags Penetration testingSimulate attacks to identify and exploit vulnerabilities in systems and learn about key trends that shape this field. Buffer Overflows and Authentication Bypasses - exploiting CVE-2025-0282 and CVE-2024-55591A critical Ivanti flaw lets attackers bypass defenses faster than you can patch. But that's not all. A silent vulnerability lurks in Fortinet, too.Author(s)Iulian TitaPublished at28 Feb 2025Updated at28 Feb 2025Cross-site WebSocket hijacking: understanding and exploiting CSWSHThis is an example of why it's worth taking a look in all the "boring" places (think RFC). They just might help you find the vulnerability you've been searching for!Author(s)Sacha IakovenkoPublished at30 Oct 2024Updated at05 Nov 202417 Infosec pros talk about the future of penetration testingAs offensive security specialists, we want to understand how pentesting changes over the next decade so we can use our experience and know-how to make better decisions.Author(s)Ioana RijnetuPublished at25 Nov 2022Updated at27 Mar 2025
Buffer Overflows and Authentication Bypasses - exploiting CVE-2025-0282 and CVE-2024-55591A critical Ivanti flaw lets attackers bypass defenses faster than you can patch. But that's not all. A silent vulnerability lurks in Fortinet, too.Author(s)Iulian TitaPublished at28 Feb 2025Updated at28 Feb 2025
Cross-site WebSocket hijacking: understanding and exploiting CSWSHThis is an example of why it's worth taking a look in all the "boring" places (think RFC). They just might help you find the vulnerability you've been searching for!Author(s)Sacha IakovenkoPublished at30 Oct 2024Updated at05 Nov 2024
17 Infosec pros talk about the future of penetration testingAs offensive security specialists, we want to understand how pentesting changes over the next decade so we can use our experience and know-how to make better decisions.Author(s)Ioana RijnetuPublished at25 Nov 2022Updated at27 Mar 2025