Latest Blog Posts

1306, 2018

Preparing for Your First Physical Penetration Test

By |June 13th, 2018|

A physical penetration test is an evaluation of the security controls that exist in a physical environment to prevent unauthorized access. These security controls could include the implementation of badge-controlled doors and elevators, security cameras, security guards, and even man traps. The primary [...]

2905, 2018

Top 4 Ways to Secure Your WordPress Installation

By |May 29th, 2018|

WordPress is the most used Content Management System (CMS) on the Internet today. Many small and large businesses use WordPress for a multitude of reasons, including e-commerce, blogging, publishing news, socializing, and more. Although there are many options out there for building and [...]

705, 2018

How Opening a PDF Could Leak Your Account Credentials

By |May 7th, 2018|

Interacting with PDF documents is a normal part of day-to-day business operations for many organizations. In many cases, this is the preferred file format to electronically transfer important and sensitive information, such as policies, procedures, bank statements, electronic W2 forms, customer-related information, and [...]

1812, 2017

Detecting and Preventing Common Microsoft Office Exploits

By |December 18th, 2017|

Overview One of the most common attack vectors in today’s world is the exploitation of Microsoft’s Dynamic Data Exchange (DDE) functionality, a feature that is implemented within the Microsoft Office suite. Attackers and penetration testers have been leveraging such functionality to gain [...]