The Axios supply chain attack exposed why dependency scanning fails against credential compromise. Learn how attackers backdoor popular packages and what your penetration tests are missing.
Resources
Blog
Greg Anderson
Blogs by Greg Anderson
Four botnets. Three million devices. The same IoT vulnerabilities security teams have deprioritized for years. What defenders keep getting wrong.
AI isn't creating new cyberattacks. It's making existing ones faster and more scalable. Learn what Anthropic's research really reveals about AI-enabled threats and how organizations can prepare.
Learn how Sprocket’s AI Remediation Assistance turns vague vulnerability findings into clear, actionable fixes.
Rotating pentesters every year may sound like getting “fresh eyes,” but it often resets progress and weakens security maturity. Learn why continuity-based penetration testing, anchored in frameworks like MITRE ATT&CK and iterative feedback loops, drives deeper insight, faster remediation, and stronger defenses over time.
Comcast Business Cybersecurity Threat Report analyzed events, revealing how attackers are shifting tactics and accelerating the pace at which exposures become exploitable. We will expand on four of the threats that keep showing up in breach postmortems, how they work in reality, and what organizations should do about them.