You are here:
Depending on the customer’s preference, possible initial access vectors in our red teaming exercises typically include deployment of dropboxes,…
TL;DR: PowerShell tool to enumerate Entra ID objects, assignments and identify highly privileged objects or risky configurations.…
As a pentester you are sometimes thrown into projects where you have no idea where you are going to end up. This project was one of those where you…
Red Team Operator. A hype-tagged role tag for which one question hits our corporate LinkedIn inbox very often. “Hey there, how can I become a Red Team…
In the previous posts of this series, we looked at different ways to bypass web filters, such as Host header spoofing and domain fronting. As we’ve…
SINDEX is the leading Swiss exhibition for industrial automation. The industry meeting place presents the trends, innovations and key technologies of…
The 18th edition of the Data Breach Investigations Report (DBIR) was published in April – for the first time with Compass Security as a contributor.
More blog posts