Posts by

Chris Dale

Mobile Apps Can Reveal Valuable Information for Attackers

Mobile applications have become a crucial part of modern business operations, with many companies relying on them to connect with customers, manage internal processes, and handle sensitive information. However, the...
Read More about Mobile Apps Can Reveal Valuable Information for Attackers

Active Trace – Adding Deception to Aid Detection and Attack Surface Management

As the prevalence of cyber attacks continues to rise, it's more important than ever for organizations to protect themselves online. One tool that can help with this is Active Trace,...
Read More about Active Trace – Adding Deception to Aid Detection and Attack Surface Management

Combatting Digital Threats with Active Focus – Your Brand

Active Focus is designed to constantly monitor the digital attack surface of a business or organization, looking for signs of malicious activity or attempts to fraudulently use the company's brand....
Read More about Combatting Digital Threats with Active Focus – Your Brand

The Key to Successful Third-Party Management in the SaaS Space

Third party vendors and subcontractors can introduce significant risk to a company, particularly if they are not properly monitored and managed. In order to help mitigate these risks, companies can...
Read More about The Key to Successful Third-Party Management in the SaaS Space

Where Applications Reside, Vulnerabilities Arise – Network Services

Firewalls are considered to be a blocking control on our networks, but inherently also exists to allow users access to functionality; functionality provided by applications. Applications unfortunately regularly contain vulnerabilities,...
Read More about Where Applications Reside, Vulnerabilities Arise – Network Services

Why Do We Monitor for Domains? Finding Keys to the Kingdom!

Domains represent a crucial and vital part of the attack surface our organizations expose. A DNS ("Domain Name System") is a central part of every organization and can essentially be...
Read More about Why Do We Monitor for Domains? Finding Keys to the Kingdom!

Users and Cyber Threat Intelligence

Cyber Criminals Can Do It, So Can We! Is there any new opportunities Cyber Threat Intelligence provide our Offensive Engineers? On a regular basis, organizations are compromised because of credentials...
Read More about Users and Cyber Threat Intelligence

Why We Monitor Technology

A key pillar in every organizationTECHNOLOGY Why and how do we monitor it? What kind of opportunities does it present our Offensive Security Operations Center? With aged technology comes vulnerabilities....
Read More about Why We Monitor Technology

What is an Offensive Security Operations Center?

Penetration Testing exercises has for a long time has several flaws in its execution. For example: What is the scope of the penetration test? Who is best capable of setting...
Read More about What is an Offensive Security Operations Center?

❄River Security XMAS Advent Challenge ❄

The deadline, which was a short one, was set to the 27th of December, meaning only the most diligent and hard-working 🤶Santa’s little elves🎅 hackers would be able to participate...
Read More about ❄River Security XMAS Advent Challenge ❄