Technical | Vulnerability Management

Open Source Software – Is It the Death of Your Company?

Technical | Mobile Application Pentesting

Dumping Memory on iOS 8

Technical | Network Pentesting

Maintaining Persistence via SQL Server – Part 1: Startup Stored Procedures

Technical | Web Application Pentesting

Java Deserialization Attacks with Burp