Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Greg Anderson

Blogs by Greg Anderson
Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.
Apr 02, 2026

Axios Got Backdoored Through a Trusted Account. Your CI/CD Pipeline Has the Same Problem.

The Axios supply chain attack exposed why dependency scanning fails against credential compromise. Learn how attackers backdoor popular packages and what your penetration tests are missing.
The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed
Mar 30, 2026

The Three Million Device Takedown Reveals Why Your IoT Security Theater Failed

Four botnets. Three million devices. The same IoT vulnerabilities security teams have deprioritized for years. What defenders keep getting wrong.
AI Is Accelerating Attacks, Not Reinventing Them: What Anthropic’s Research Really Tells Us
Nov 20, 2025

AI Is Accelerating Attacks, Not Reinventing Them: What Anthropic’s Research Really Tells Us

AI isn't creating new cyberattacks. It's making existing ones faster and more scalable. Learn what Anthropic's research really reveals about AI-enabled threats and how organizations can prepare.
Closing the Gap Between Finding and Fix: Introducing AI Remediation Assistance
Nov 13, 2025

Closing the Gap Between Finding and Fix: Introducing AI Remediation Assistance

Learn how Sprocket’s AI Remediation Assistance turns vague vulnerability findings into clear, actionable fixes.
The Pentester Rotation Myth
Oct 14, 2025

The Pentester Rotation Myth

Rotating pentesters every year may sound like getting “fresh eyes,” but it often resets progress and weakens security maturity. Learn why continuity-based penetration testing, anchored in frameworks like MITRE ATT&CK and iterative feedback loops, drives deeper insight, faster remediation, and stronger defenses over time.
From Threat Volume to Real-World Exposure: What the 2025 Comcast Cybersecurity Threat Report Tells Us
Oct 03, 2025

From Threat Volume to Real-World Exposure: What the 2025 Comcast Cybersecurity Threat Report Tells Us

Comcast Business Cybersecurity Threat Report analyzed events, revealing how attackers are shifting tactics and accelerating the pace at which exposures become exploitable. We will expand on four of the threats that keep showing up in breach postmortems, how they work in reality, and what organizations should do about them.
1 2