Explore the minds of The NetSPI Agents

Advance your proactive security knowledge by learning from some of the brightest people in cybersecurity. Our executive blog gives perspective on industry trends, while Hack Responsibly dives deep into the latest CVEs and tactical approaches our team takes. Take your pick!

Proactive Security

Proactive Security 101: Discover, Prioritize, Remediate 

What is proactive security? And what are the tangible steps you can take to implement proactive security measures? NetSPI is here to be your guide.

Learn More
Compliance

Navigating Cybersecurity Regulations Across Financial Services

Learn about five areas businesses should consider to help navigate cybersecurity regulations, such as the Digital Operations Resiliency Act (DORA).

Learn More
NetSPI Updates

A New Era of Proactive Security Begins: The Evolution of NetSPI 

Introducing The NetSPI Platform, the proactive security solution used to discover, prioritize, and remediate the most important security vulnerabilities. Plus, get a first look at NetSPI’s updated brand!

Learn More
Penetration Testing as a Service (PTaaS)

Penetration Testing: What is it?

Learn about 15 types of penetration testing, how pentesting is done, and how to choose a penetration testing company.

Learn More
Ransomware

Ransomware Prevention, Detection, and Simulation

Your complete guide to ransomware. Learn what ransomware is, how it fuels criminal activity, how it works, and how to stop it.

Learn More
Attack Surface Management (ASM)

How to Use Attack Surface Management for Continuous Pentesting

Uncover attack surfaces and exposures with NetSPI’s offensive security including Attack Surface Management (ASM) to enable continuous pentesting.

Learn More
Cloud Pentesting

Elevating Privileges with Azure Site Recovery Services

Discover how NetSPI uncovered and reported a Microsoft-managed Azure Site Recovery service vulnerability and how the finding was remediated.

Learn More
Personnel Development

Mainframe Mania: Highlights from SHARE Orlando 2024 

NetSPI Security Consultant Michelle Eggers attended SHARE Orlando 2024 for a hands-on educational conference focused on mainframe security.

Learn More
Blockchain Pentesting

Web2 Bugs in Web3 Systems

Discover how attackers use vulnerabilities in off-chain components to achieve critical impact against on-chain systems.

Learn More
Attack Surface Management (ASM)

From Scanners to Strategies: How Attack Surface Management Enhances Vulnerability Scanning 

Vulnerability scanners and attack surface management work better together. See how the combination works toward a proactive security strategy.

Learn More
Cloud Pentesting

Azure Deployment Scripts: Assuming User-Assigned Managed Identities

Learn how to use Deployment Scripts to complete faster privilege escalation with Azure User-Assigned Managed Identities.

Learn More
Adversary Simulation

CVE-2024-21378 — Remote Code Execution in Microsoft Outlook 

NetSPI discovered that Microsoft Outlook was vulnerable to authenticated remote code execution (RCE) via synced form objects. Learn how NetSPI discovered and exploited the vulnerability.

Learn More