• VISION Portal Access
www.anitian.com
MENUMENU
  • Sherlock
    • Compliance Automation
    • Managed Detection and Response
  • Services
    • Compliance
    • Penetration Testing
    • Risk Assessment
    • Virtual CISO
  • Resources
    • Media
    • Industries
      • SaaS and Cloud
      • Retail
      • Healthcare
      • Financial
      • Government
  • Blog
  • Company
    • About
    • Careers
    • Events
  • Contact
  • Customer Payment Portal
  • Sherlock EULA
  • Terms and Conditions
  • Privacy Policy
Select Page

A Study in Exploit Development – Part 2: Taking it to the Next Level

by Rick Osgood | Apr 2, 2018 | Application Security, Penetration Testing, Vulnerabilities

Welcome to Part 2 of this 2-part blog series looking at the details of exploring and validating an exploit! If you liked this series, I bet you’d be interested in our webinar on How to Think Like A Hacker, check it out! Now on to Part 2: Taking it to the Next...

A Study in Exploit Development – Part 1: Setup and Proof of Concept

by Rick Osgood | Mar 27, 2018 | Application Security, Penetration Testing, Vulnerabilities

A Study in Exploit Development: Easychat SEH exploit A typical penetration test involves automated scanning to identify vulnerabilities, followed by a more manual testing process where the tester attempts to validate and exploit those vulnerabilities. Many times, we...

What You Need to Know About Meltdown and Spectre

by Andrew Plato | Jan 24, 2018 | Vulnerabilities

It has been a few weeks since security researchers discovered that nearly every processor on earth is vulnerable to Meltdown and Spectre vulnerabilities. Panic is spreading. We agree, this is a serious set of vulnerabilities.  But, no need to panic. We got this. No...

Anatomy of a Hack: Cross-Site Request Forgery (CSRF)

by Rick Osgood | Aug 20, 2015 | Uncategorized, Vulnerabilities, Vulnerability Research

During the course of a web application test, occasionally our automated tools will miss a serious vulnerability.  Cross-Site Request Forgery is one of these vulnerabilities that our scanners sometime miss.  You can read more about CSRF here.  This is why it is so...

Enough with the Stunt Hacking

by Andrew Plato | Jul 22, 2015 | Uncategorized, Vulnerabilities, Vulnerability Research

In the information security industry’s latest attention grabbing headline, we have the tale of Charlie Miller and Chris Valasek hacking a Jeep Cherokee and disabling it while driving down the highway.  You can read about this hack here. This is stunt hacking. That is,...

Shellshock – What You Need to Know

by Andrew Plato | Sep 25, 2014 | Uncategorized, Vulnerabilities

The Shellshock (or Bash) bug is the latest serious bug to hit the scene.  So what do you need to know about this bug?  Anitian has a quick summary. What is Shellshock? It is a very serious bug to Bash, a ubiquitous command shell for Unix and Linux systems.  When...
« Older Entries

Recent Posts

  • The Next Shiny Object
  • Owning SAML
  • CyberSecurity 2028: By Default, By Design
  • The NGFW is Dead
  • RSA 2018 – Buzzword Bingo

Recent Comments

  • Bob Hashtag on The NGFW is Dead
  • Ramid on The Next Shiny Object
  • Jackson Hager on The Next Shiny Object
  • Topo on The Cult of Palo Alto Networks
  • sahil on Hacking Microsoft SQL Server Without a Password

Archives

  • December 2018
  • October 2018
  • September 2018
  • August 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012

Categories

  • Application Security
  • Application Security|Vulnerabilities
  • Black Hat
  • Blog
  • Breaches
  • Business of Security
  • BYOD
  • Compliance
  • Cyberwar
  • GDPR
  • HIPAA
  • Human Factors
  • IDS/IPS
  • Industry Analysis
  • ISO 27001
  • Language of Security
  • Millennials
  • Mobile Security
  • NIST
  • Opinion
  • Opinion|Security Leadership
  • PCI
  • Penetration Testing
  • Politics
  • Privacy
  • Psychology of Security
  • Risk Management
  • RSA Conference
  • RSAC 2012
  • RSAC 2013
  • RSAC 2015
  • RSAC 2016
  • RSAC 2017
  • RSAC 2018
  • SCADA
  • Security Analytics
  • Security Leadership
  • Security Management
  • Sherlock Threat Intelligence
  • System Security
  • Uncategorized
  • UTM / NGFW
  • Video
  • Vulnerabilities
  • Vulnerability Management
  • Vulnerability Research
  • Webinar
  • Webinar Video
  • Writing for Cybersecurity

Meta

  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org

Navigation

  • Sherlock
    • Compliance Automation
    • Managed Detection and Response
  • Services
    • Compliance
    • Penetration Testing
    • Risk Assessment
    • Virtual CISO
  • Resources
    • Media
    • Industries
      • SaaS and Cloud
      • Retail
      • Healthcare
      • Financial
      • Government
  • Blog
  • Company
    • About
    • Careers
    • Events
  • Contact
  • Customer Payment Portal
  • Sherlock EULA
  • Terms and Conditions
  • Privacy Policy

Search

Copyright

© 2019 Anitian. All rights reserved.

Follow Us

LinkedIn
Twitter
Youtube
Facebook