Explore the Minds of The NetSPI Agents

Advance your proactive security knowledge by learning from some of the brightest people in cybersecurity. Our executive blog gives perspective on industry trends, while Hack Responsibly dives deep into the latest CVEs and tactical approaches our team takes. Take your pick!

AI/ML Pentesting

Anthropic’s Mythos Announcement: What it Means for Security Teams

Anthropic’s Mythos accelerates automated vulnerability discovery. Read how to mitigate risk with custom benchmarks and human verification in your workflows.

Learn More
Hardware Penetration Testing

Regulatory-Ready Security: Ensuring FCC Compliance for Routers

Last week, the FCC released a major update to the “Covered List”, officially adding foreign-produced consumer-grade routers to the registry of equipment deemed a threat to national security. This declaration was in part due to the discovery of backdoors in select routers that used standard apps in an attack chain to create a backdoor into seemingly protected networks. 

Learn More
Critical Vulnerability

CVE-2026-35616 & CVE-2026-21643 – Fortinet FortiClientEMS: Overview & Takeaways

Fortinet has disclosed two critical vulnerabilities in FortiClient Endpoint Management Server (EMS) that are both under active exploitation in the wild. 

Learn More
AI/ML Pentesting

AI Fools Week: Don’t Let AI Fool Your Pentesting Strategy

AI is transforming penetration testing. It promises speed, scale, and automation. But here is the catch. When used in isolation, AI can create a false sense of security. And that is no joke. A modern approach to pentesting requires balance, combining the efficiency of AI with the expertise of human testers. Without that balance, organizations risk missing what matters most.

Learn More
AI/ML Pentesting

LiteLLM Supply Chain Compromise

A supply chain attack compromised LiteLLM versions 1.82.7 and 1.82.8 on PyPI, exfiltrating credentials and secrets to an attacker-controlled server.

Learn More
NetSPI Updates

Meet NetSPI’s Modern Pentesting Experience: Use Case-Driven, AI-Accelerated

The new NetSPI experience represents the next evolution of pentesting—smarter, faster, and designed for scale.

Learn More
NetSPI Updates

Forrester Recognizes NetSPI in Proactive Security Landscape Report  

NetSPI has been recognized among Notable Vendors in the Forrester Proactive Security Platforms Landscape, Q1 2026. Learn how we unify ASM, VRM, and pentesting.

Learn More
Critical Vulnerability

CVE-2025-26399 SolarWinds Web Help Desk Overview and Takeaways 

A critical vulnerability (CVE-2025-26399) has been identified in SolarWinds Web Help Desk, which allows unauthenticated remote attackers to execute arbitrary code on affected systems. Although CVE-2025-26399 was originally disclosed in 2025, recent reports confirm this vulnerability is now being actively exploited in the wild.

Learn More
Adversary Simulation

7 Ways to Execute Command on Azure Virtual Machines & Virtual Machine Scale Sets

Examples of different command execution paths for Azure Virtual Machines and Virtual Machine Scale Sets.

Learn More
Attack Surface Visibility

NetSPI Recognized for Second Consecutive Year by GigaOm

For the second consecutive year, NetSPI has been recognized in the GigaOm Radar Report for Attack Surface Management.

Learn More
Critical Vulnerability

CVE-2026-20127 – Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Overview & Takeaways

A critical authentication bypass vulnerability (CVE-2026-20127) has been identified in Cisco Catalyst SD-WAN Controller and Manager. This flaw allows unauthenticated, remote attackers to gain administrative privileges on affected systems. Exploitation in the wild has been confirmed, and immediate action is required to mitigate risk.

Learn More
Cloud Pentesting

Stay Ahead of Cloud Threats: Introducing Azure and AWS Security Reviews

Discover how NetSPI’s Azure & AWS Configuration Reviews provide continuous visibility, risk identification, and actionable insights to secure your cloud environments.

Learn More