Threat and vulnerability management

Threat and vulnerability management

The Cloud is Beige - The demise of black box testing

  • Adversary Ops

4 min read

Threat and vulnerability management

With IoT, Common Devices Pose New Threats

  • Dan McInerney

8 min read

Threat and vulnerability management

The Basics of Exploit Development 2: SEH Overflows

  • Andy Bowden

8 min read

Threat and vulnerability management

The Basics of Exploit Development 1: Win32 Buffer Overflows

  • Andy Bowden

9 min read

Threat and vulnerability management

Windows Update Warning

  • Adversary Ops

2 min read

Threat and vulnerability management

Deserialized Double Dirty

  • John Skipper
Application security

ERC.Net – A Toolset for Analyzing Windows Application Crashes

  • Andy Bowden
Compliance

Dodge Data Breaches with Real-Time PCI Compliance

  • Aaron Reynolds

3 min read

Threat and vulnerability management

When Checking the Box Results in Two Zero Days and Root (CVE-2019-14257 and CVE-2019-14258)

  • Jakob Nelson