Penetration Testing
Deep Dive
March 2025
Why Your Pentest Report Is Useless — And How to Fix It
Most penetration test reports fail their clients before they are even read. They are long, jargon-heavy, sorted by CVSS score, and designed to demonstrate the tester's knowledge rather than guide the client's response. Here is how a good report should actually be structured — and what questions it needs to answer.
FINDING #001 · CRITICAL
Remote Code Execution via Unsanitized Input
CVSSv3: 9.8 · Affected: api.target.com/v2/upload
▸ What it is
▸ How we found it
▸ What an attacker can do
▸ How to fix it — specific, prioritized
OSINTFeb 2025
The 7 OSINT Mistakes That Ruin Investigations
From confirmation bias to improper chain of custody, these are the errors that get OSINT investigators into legal trouble, produce unreliable intelligence, or simply waste time. How to avoid all of them.
Cloud SecurityFeb 2025
AWS Misconfigurations That Lead to Breaches — The 2025 List
S3 public access is just the beginning. An updated analysis of the 12 AWS misconfigurations most commonly found in real environments — ranked by breach frequency and ease of exploitation.
Red TeamJan 2025
EDR Evasion in 2025: What Still Works
Endpoint Detection and Response products have matured significantly. But so have the techniques to bypass them. A practitioner's analysis of which evasion approaches remain viable and why defenders struggle to close the gap.
Threat IntelJan 2025
Salt Typhoon and the Telecom Breach Nobody Talks About
The compromise of nine US telecommunications providers by Salt Typhoon was the most significant intelligence breach in decades. What actually happened, what the attackers accessed, and what it means for telecom security globally.
OSINTDec 2024
Geolocating Images with Only Shadows and a Compass
Shadow analysis is one of the most powerful — and underused — techniques in geospatial investigation. A practical walkthrough of the methodology, the tools, and the limitations of shadow-based geolocation in open-source investigations.
Penetration TestingDec 2024
Active Directory in 2025: The Attack Paths That Keep Working
Kerberoasting. Pass-the-Hash. DCSync. BloodHound paths. Despite being well-documented for years, these Active Directory attack techniques remain effective in the majority of enterprise environments we test. Here is why — and what defenders keep getting wrong.
Cloud SecurityNov 2024
Azure vs AWS vs GCP: Which Cloud Is Hardest to Secure?
After hundreds of cloud security assessments across all three major providers, we have an informed perspective on which platform has the best security defaults, which has the most dangerous misconfigurations, and what each gets right that the others don't.