Performing security assessments on cloud providers can be difficult, due to the lack of information on best offensive tactics. A cron job is an effective, persistence technique to use on Google Cloud Provider (GCP). It’s easy to set up and can easily go undetected by the untrained eye.
SIM swap scams are everywhere, and it is all too easy to become a victim of them. Although SIM swapping sounds technical, it is actually a form of social engineering, which means hacking humans instead of hacking technology.
It's surprisingly easy for a malicious hacker to do a subdomain takeover. Here's how to protect yourself from this type of attack.
Don't spend all your IT asset discovery time doing vertical domain correlation. Here's how to do horizontal correlation too - and it can be automated!
Here's how bad actors can use JavaScript frameworks such as React, Vue and Angular to attack the frontend of your application...and how to stop them.