
02
February 2023
Exploits Explained: Java JMX’s Exploitation Problems and Resolutions

How to Deploy Strategic Pentesting in Your Vulnerability Management Program
26 January

The Top 5 Cybersecurity Vulnerabilities for Government Agencies in 2022
19 January

Exploits Explained: Second Order XXE Exploitation
06 January

How Synack Scales Pentesting Without Compromising Quality
15 December
-
Making Security Testing Part of Your Agile Software Development Life Cycle
14 December
-
Don’t Let API Penetration Testing Fall Through the Cracks
13 December
-
Untangling Your Cloud Assets with Offensive Security Testing
08 December
-
Worry-free Pentesting: Continuous Oversight In Offensive Security Testing
06 December
-
Account Takeovers: Believe the Unbelievable
18 November
-
What’s Wrong with Bug Bounty Programs?
15 November
-
Minimize Noise With Human-Led API Pentesting
10 November
-
Reporting Can Be the Hero or Villain of Your Cybersecurity Pentesting
08 November
-
How I Found My Next Mission In Cybersecurity
02 November
-
Growing into the Synack Red Team
01 November
-
Synack Expands Security Platform with Adversarial API Pentesting
31 October
-
Battling the Next Log4j: How to Prepare Your Security Team While Avoiding Burnout
27 October
-
Optimize Your SOC with ServiceNow and Synack
26 October
-
See Your Cyber Defenses with an Adversarial Perspective Using Red Teaming and Pentesting
18 October
-
Exploits Explained: A Spy’s Perspective On Your Network
17 October