What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly…

View More What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams
How a Hacker's Mom Broke Into a Prison—and the Warden's Computer

How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer

John Strand breaks into things for a living. As a penetration tester, he gets hired by organizations to attack their defenses, helping reveal weaknesses before…

View More How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer
Penetration Testing: Breaking in to Keep Others Out

Penetration Testing: Breaking in to Keep Others Out

Penetration testing is a direct test of an application, a device, a website, an organization, and even the people that work at an organization. It…

View More Penetration Testing: Breaking in to Keep Others Out
The Air Force Will Let Hackers Try To Hijack An Orbiting Satellite

The Air Force Will Let Hackers Try To Hijack An Orbiting Satellite

When the Air Force showed up at the Defcon hacker conference in Las Vegas last month, it didn’t come empty-handed. It brought along an F-15…

View More The Air Force Will Let Hackers Try To Hijack An Orbiting Satellite
Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Breach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint. The breach of outsourcing firm…

View More Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro