Solid security begins with knowing. Excels by doing.
Breach-Parse Basics
Open source intelligence gathering, or OSINT, can be a threat to organizations because it can be used to gather information about their employees, assets, and vulnerabilities. This information can then be used to launch targeted scanning against discovered...
PCI DSS 3.2.1 to 4.0 Control Changes – Requirement 3
Today, let’s look at some changes made to Requirement 3 for PCI DSS 4.0. I am also adding “Why does this matter?” sections at the end of each control change to hopefully shed light on why it's important. Requirement 3 Changes In Requirement 3, we will find an...
Responder – The Tool That Won’t Die
Overview One of the most common findings we make at Contextual Security Solutions during internal penetration tests is the presence of vulnerable network protocols, like Link-local Multicast Name Resolution (LLMNR), Web Proxy Auto-Discovery (WPAD)...