Explore the minds of The NetSPI Agents

Advance your proactive security knowledge by learning from some of the brightest people in cybersecurity. Our executive blog gives perspective on industry trends, while Hack Responsibly dives deep into the latest CVEs and tactical approaches our team takes. Take your pick!

Hardware and Embedded Systems Penetration Testing

Practical Methods for Decapping Chips

Discover the intricate process of chip decapping, exposing secrets stored within snuggly layers of industrial epoxy, sleeping in beds of silicon.

Learn More
Cloud Pentesting

Hijacking Azure Machine Learning Notebooks (via Storage Accounts)

Abusing Storage Account Permissions to attack Azure Machine Learning notebooks

Learn More
NetSPI Updates

Celebrating NetSPI’s Partners of the Year 2024

Congratulations to NetSPI’s 2024 Partner of the Year Recipients Defy Security, VLCM, Softcat, Enduir, Evotek, and AWS

Learn More
Web Application Pentesting

Exploiting Second Order SQL Injection with Stored Procedures

Learn how to detect and exploit second-order SQL injection vulnerabilities using Out-of-Band (OOB) techniques, including leveraging DNS requests for data extraction.

Learn More
Proactive Security

CTEM Defined: The Fundamentals of Continuous Threat Exposure Management

Learn how continuous threat exposure management (CTEM) boosts cybersecurity with proactive strategies to assess, manage, and reduce risks.

Learn More
AI/ML Pentesting

Balancing Security and Usability of Large Language Models: An LLM Benchmarking Framework

Explore the integration of Large Language Models (LLMs) in critical systems and the balance between security and usability with a new LLM benchmarking framework.

Learn More
Web Application Pentesting

From Informational to Critical: Chaining & Elevating Web Vulnerabilities

Learn about administrative access and Remote Code Execution (RCE) exploitation from a recent Web Application Pentest.

Learn More
Compliance

Q&A with Jonathan Armstrong: An Inside Look at CREST Accreditation

Explore the role of CREST accreditation in cybersecurity, its link to DORA, and insights from Jonathan Armstrong on its future in the security industry.

Learn More
Security Industry Trends

2025 Cybersecurity Trends That Redefine Resilience, Innovation, and Trust

Explore how 2025’s biggest cybersecurity trends—AI-driven attacks, deepfakes, and platformization—are reshaping the security landscape.

Learn More
Attack Surface Management (ASM)

The Attack Surface is Changing – So Should Your Approach

Discover the pitfalls of DIY attack surface management and why NetSPI’s solutions offer superior security and efficiency.

Learn More
Attack Surface Management (ASM)

NetSPI’s Insights from Forrester’s Attack Surface Management Solutions Landscape, Q2 2024

Read NetSPI’s perspective on key takeaways from Forrester’s The Attack Surface Management Solutions Landscape, Q2 2024.

Learn More
Network Pentesting

Hunting SMB Shares, Again! Charts, Graphs, Passwords & LLM Magic for PowerHuntShares 2.0

Learn how to identify, understand, attack, and remediate SMB shares configured with excessive privilege in active directory environments with the help of new charts, graphs, and LLM capabilities.

Learn More