May 28, 2020 | Penetration Testing
This is an article in a series on Web Application Vulnerability Basics. What Is Cross-Site Request Forgery? Cross-Site Request Forgery, also known as CSRF and XSRF, is a web application attack that tricks a victim into submitting a malicious request to a web app that...
May 28, 2020 | Cybersecurity, eCommerce Fraud Prevention, Podcast
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreIn this weeks Breach of the Week, Justin and Zack discuss not one, but two, separate breaches at Marriott hotels, one releasing nearly...
May 26, 2020 | Cybersecurity, Podcast
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreIt’s graduation season and despite the very strange and challenging times we live in, a lot of awesome and talented students are...
May 21, 2020 | Penetration Testing
This is an article in a series on Web Application Vulnerability Basics. What Is a Path Traversal Attack? Path traversal, also known as directory traversal and backtracking, is an exploit that allows an attacker to access files on a web server that they are not...
May 21, 2020 | Cybersecurity, Penetration Testing, Podcast, Uncategorized
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreOn this week’s episode, we’re testing how far a breach can go and what happens when a customer is 100% positive...
May 19, 2020 | Cybersecurity, Podcast
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreWhy are government agencies constantly a target for ransomware? Not a day goes without a story about a city or government agency that is...
May 14, 2020 | Information Security
The cybersecurity talent thing is getting old. Everyone talks about it, but nothing really changes across the industry. We don’t have the cybersecurity talent, we don’t have the skillset, we can’t keep our cybersecurity talent. But honestly,...
May 14, 2020 | Cybersecurity, Penetration Testing, Podcast, Vulnerability Scanning
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreThis week we’re again joined by Eric and Randy to hear some war stories. Randy takes us through the time that he immediately...
May 12, 2020 | Information Security
If you pay any attention to cyber security related news, you likely have noticed a large uptick in ransomware attacks targeting state and local governments. These ransomware attacks include Albany New York, Lake City Florida, Jackson County Georgia, Baltimore...
May 12, 2020 | Cybersecurity, Information Security, Podcast
Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreWhether you recently graduated or are looking to break into cyber security, you need to check out our hiring and recruiting episode with...