# Vulnerability Management

Blog

How to test application with ZAP - Part Two

Sep 28, 2022

Recent Posts

By Jenny R
Sep 28, 2022

How to test application with ZAP - Part Two

This part of the series covers how to create an Angular application, deploy it using Docker, and how to set up ZAP so you can start testing the application inside the test environment.
By Jenny R
Sep 28, 2022

How to test application with ZAP - Part One

This part of the topic covers how to setup your machine so you can start with the security testing tool- ZAP.
By Paul Lighter
Sep 27, 2022

The World's Worst Hackers Have Flags

Who's responsible for ransomware? The Iranian government, in no small part. State-sponsored hackers suggest an alarming future for cybersecurity.
By acephale 4w
Sep 26, 2022

Intro to Windows (Win32) API

Quick and dirty intro to Windows API as part of the upcoming Red Team series.
By Kent Weigle
Sep 23, 2022

State of the Union's Infrastructure Security According to CISA

Can CISA defeat the evils of political and infrastructural inertia to harden the USA's critical sectors against cyber attacks? We'll probably find out in 20 years.
By Evan Kling
Sep 23, 2022

CISAnalysis - September 23, 2022

Sopho Zoho, Zopho Sohos? Jokes aside, these vulnerabilities are a solid entry as we head into horror season.
By Wilson Corbett
Sep 22, 2022

Unearthing Meta's Quarterly Adversarial Threat Report (Q2 2022)

Meta's Quarterly Adversarial Threat Report discusses the changes in the threat environment and its efforts to expand and cover new areas of the Trust & Safety program. In the report, Meta has shared its various security enforcements and notable investigations and trends to help inform its community's understanding of the evolving threat landscape. This piece discusses in detail the information covered in the report.
By Michael Assraf
Sep 22, 2022

Asset inventory just got 10x smoother

Our latest dashboard release includes a few enhancements for our asset visibility features
By Paul Lighter
Sep 21, 2022

Unpacking the Latest Uber Attack – Small Incident, Big Impact

Once again, hackers breached Uber. It's not Uber's worst attack - but it's one of their most interesting, and the takeaways are important for all.
By acephale 4w
Sep 20, 2022

Windows Enumeration

Windows enumeration - System, Users, Network. Basic commands, and some automated tools to help with the process.
By Evan Kling
Sep 16, 2022

CISAnalysis - September 15, 2022

Back-to-back kernel popping?! Vulnerabilities added from Obama’s first presidency? What gives?...
By Paul Lighter
Sep 16, 2022

History in the Making: Uber CISO Goes on Trial

As Uber's former CISO goes on trial, the future of cybersecurity is at stake. Start tracking this trial because the outcome affects every single one of us.
By Kent Weigle
Sep 15, 2022

Twitter Whistleblower Hearing

Zatko's testimony paints a damning picture, but are lawmakers willing to step up and regulate?
By Evan Kling
Sep 14, 2022

CISAnalysis - September 14, 2022

Two zero-days, both giving system/kernel level privileges...is someone tricking me? Sec teams: this one's important.
By Jenny R
Sep 13, 2022

OWASP Top 10 - Cryptographic failures

This article covers the basics of one of the OWASP Top 10 vulnerabilities from the latest list (2021) - Cryptographic failures.