Everything is just theory until tested. In cybersecurity, the outcome of a failed theory is real-world problems like hijacked or stolen data, damaged brand trust, and tangible financial costs. This is where offensive security comes into play. In the hands of highly...
Pentesting
Inside the 2024 Red Team Penetration Testing Report
In the unending barrage of cyber attacks, keeping pace with current threats is paramount. A proactive approach that includes penetration testing raises the bar higher, finding exploitable weaknesses before attackers can exploit them. Our report condenses 12 months of...
CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated Remote Code Execution
Converge security researchers responsibly disclosed a critical unauthenticated zero-day vulnerability affecting the CrushFTP enterprise suite in August of 2023. With approximately 10,000 public instances and many more behind corporate firewalls, the vulnerability...
How Pen Testing Curbs Security Leaks in the CI/CD Pipeline
Software and application developers have a need for speed. Being first-to-market when it comes to products, services, and features has competitive advantages. To fast-track development, more organizations are combining methodologies, practices, and automation that...
2022 Pentesting: A Red Team Review
The ever-changing threat landscape is a popular topic for cybersecurity resources. An astonishing number of articles, whitepapers, and podcasts reference this in one way or another. And it’s true, shifting and emerging attack vectors and methods are a reality for...