Webinars
Find the latest Webinar content from the Sprocket Testing Team.
Webinars
Pentesters Chat - Breaking into AI and Machine Learning Systems
On this episode of Pentesters Chat, our team explores the distinct security vulnerabilities that arise when testing AI/ML systems compared to traditional systems.Adversarial Attacks: Understand how adversarial inputs… read more →
Super Cyber Friday: "Hacking the Future of Pentesting"
Casey Cammilleri, Founder and CEO for Sprocket, appeared on Super Cyber Friday on Aug 23, 2024. He was joined by host David Spark (@dspark), producer of CISO Series, and Stephen Harrison, CISO of MGM Resorts… read more →
Pentesters Chat - Previewing August 2024's major cybersecurity events
This week our team discusses BSides, Black Hat and DEFCON, three major events hosted in Las Vegas over the next two weeks. Find out what presentations and networking events to attend to get the most out of these… read more →
Pentesters Chat - How to bypass Web Application Firewalls (WAFs) with Gigaproxy
Nicholas Anastasi and Joseph Morris discuss the latest tool to help you bypass Web Application Firewalls (WAFs) during external penetration tests and bug bounty programs. The tool was created by Sprocket's pen testers,… read more →
Surfacing the Invisible Web Application Attacks and Attack Surface Management
Watch for an insightful webinar as Will merges the worlds of web application penetration testing and Attack Surface Management (ASM) data. Using examples from real life penetration tests, he will demonstrate some of the… read more →
Lessons Learned: Physical Penetration Testing
Watch for an engaging and informative exploration of Physical Penetration Testing (PPT) with Nate Fair, a Penetration Tester at Sprocket Security! In this session, Nate will cover the complexities of PPT, sharing… read more →
Halloween Hack-O-Lantern: Spooky Tales from the Dark Side of Authentication
Uncover the eerie secrets of authentication in our upcoming Webinar, "Halloween Hack-O-Lantern: Spooky Tales from the Dark Side of Authentication." Join us as we explore authentication bypass, from ghostly vishing calls… read more →