Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Password Spraying Self-Hosted Microsoft Services
Jan 09, 2023 Sprocket Security

Password Spraying Self-Hosted Microsoft Services

Self-hosted Microsoft services, such as Exchange and Skype for Business, are ideal targets for password spraying attacks. Learn more about how these threats work and how to protect your business.
Fix Cleartext Password Issues in Your Organization
Jul 21, 2021 Nicholas Anastasi

Fix Cleartext Password Issues in Your Organization

The key to our engagements often and unfortunately involve the discovery of credentials on internal network file shares. We’re going to show you how we find cleartext password storage problems and how to address them.
Fourteen good reasons to require 14-character passwords
Jun 15, 2021 Sprocket Security

Fourteen good reasons to require 14-character passwords

Password. Password123. Yea, you’ve seen them all when it comes to bad passwords. It comes standard when managing IT security. But while your organization likely requires special characters, uppercase letters and even a number or two, if you don’t require longer passwords you’re not taking one of the most important steps to protect your network.
How to defend against password spraying
Oct 21, 2020 Nicholas Anastasi

How to defend against password spraying

Given how often we see this tactic used, we’re going to break down the basics. We want to help you understand how password spraying works, along with some effective steps you can take to prevent it from being used against your organization. What is password spraying?
Multi-Factor Authentication: How Attackers Still Exploit It
Aug 21, 2020 Nicholas Anastasi

Multi-Factor Authentication: How Attackers Still Exploit It

Over the past years, we’ve urged companies to start using Multi-factor authentication (MFA) – and many have followed through. Unfortunately, we have a long way to go. First, the good news. MFA protects by adding a layer of security using an out-of-band authentication step, making it harder for attackers to gain access to an organization. Not to mention, it keeps security...
1 2 3 4 5 »