OSec
Home
CTEM: Incenter
About OSec
Case Studies
Insights
Partners
Contact Us
Services
Penetration Testing
Red Teaming
Purple Teaming
Cyber Maturity
Incident Response
CTEM: Incenter
Expertise
AI
Applications
Cloud Security
IoT
OT
Mobile
Network
Industries
Industrial
Healthcare
Education
Financial
Public Sector
Technology
Media
Private Equity
Services
Penetration Testing
Red Teaming
Purple Teaming
Cyber Maturity
Incident Response
CTEM: Incenter
CTEM: Incenter
Expertise
AI
Applications
Cloud Security
IoT
OT
Mobile
Network
Industries
Industrial
Healthcare
Education
Financial
Public Sector
Technology
Media
Private Equity
Insights
Company
About Us
Careers
Partners
Contact Us
We never stand still
Insights, Information and Resources
Constantly learning, evolving and building new ways to keep what matters to you safe.
Search Insights
December 3
/
2024
Reading Time: 6 minutes
Threat Led Pen Testing and DORA
Read Insight
November 27
/
2024
Reading Time: 5 minutes
When chatbots strike
Read Insight
November 19
/
2024
Reading Time: 4 minutes
Cyber insurance – friend or foe?
Read Insight
November 4
/
2024
Reading Time: 4 minutes
Enhancing Vulnerability Management with Incenter Tag Filtering
Read Insight
October 16
/
2024
Reading Time: 2 minutes
CISCO BREACHED DATA POSTED ON DARK WEB FORUMS
Read Insight
September 18
/
2024
Reading Time: 7 minutes
Pip Dreams and Security Schemes: Chaos in your Configuration Files
Read Insight
September 11
/
2024
Reading Time: 6 minutes
Microsoft Patch Tuesday Analysis - September 2024
Read Insight
July 11
/
2024
Reading Time: 7 minutes
Microsoft Patch Tuesday Analysis - July 2024
Read Insight
April 11
/
2024
Reading Time: 5 minutes
Microsoft Patch Tuesday Analysis - April 2024
Read Insight
March 15
/
2024
Reading Time: less than 1 minute
LLM's behaving badly part 1 - Malware creation
Read Insight
February 19
/
2024
Reading Time: 5 minutes
Purple Teams - The Business Benefits of Cost-Effective Purple Penetration Testing
Read Insight
February 16
/
2024
Reading Time: 7 minutes
Microsoft Patch Tuesday Analysis - February 2024
Read Insight
January 25
/
2024
Reading Time: 4 minutes
Living off the land, an introduction to blending in for red teams
Read Insight
January 16
/
2024
Reading Time: 4 minutes
Unleashing the Power of Purple teaming with MITRE ATT&CK
Read Insight
January 15
/
2024
Reading Time: 5 minutes
Indicators of Compromise (IOC): Understanding, Identifying, and Utilizing Cyber Threat Indicators
Read Insight
January 14
/
2024
Reading Time: 4 minutes
OSINT In Threat Hunting
Read Insight
October 11
/
2023
Reading Time: 6 minutes
What's Up, Doc? An OccamSec approach to the Looney Tunables Bug (CVE-2023-4911)
Read Insight
September 5
/
2023
Reading Time: 3 minutes
Protecting Education: Cybersecurity's Vital Mission
Read Insight
August 31
/
2023
Reading Time: 2 minutes
Will Continuous Penetration Testing lead to more Zero-Days?
Read Insight
August 29
/
2023
Reading Time: 5 minutes
A Threat Model for Space-Based Data Centers
Read Insight
August 10
/
2023
Reading Time: 3 minutes
Navigating The SEC Cybersecurity Risk Management Rules
Read Insight
August 9
/
2023
Reading Time: 4 minutes
Cracked Open: Why Overlooking Lower Risk Vulnerabilities Can Backfire
Read Insight
August 7
/
2023
Reading Time: less than 1 minute
Security Awareness Training is Mostly Pointless: A Practitioner's Perspective
Read Insight
August 7
/
2023
Reading Time: 3 minutes
The Human Touch in Cybersecurity: Why AI Can't Fully Replace Penetration Testers
Read Insight
June 29
/
2023
Reading Time: 10 minutes
Is the SQL Injection Optional?
Read Insight
June 14
/
2023
Reading Time: 5 minutes
Mastering FortiOS Exploitation: No Direct Debugging Required
Read Insight
June 8
/
2023
Reading Time: 4 minutes
Unmasking hidden dangers: The critical need for threat hunting
Read Insight
June 1
/
2023
Reading Time: 2 minutes
Major Incenter updates cover mobile, API, cloud and more
Read Insight
May 25
/
2023
Reading Time: 3 minutes
Exploit for CVE-2023-2825
Read Insight
March 22
/
2023
Reading Time: less than 1 minute
Getting Root - A technical walkthrough
Read Insight
February 21
/
2023
Reading Time: 4 minutes
Don't put all your faith in cyber insurance
Read Insight
February 6
/
2023
Reading Time: less than 1 minute
Threat Landscape Report - US Healthcare Industry
Read Insight
December 11
/
2022
Reading Time: 12 minutes
Once you POP you just can't stop
Read Insight
November 11
/
2022
Reading Time: 3 minutes
Sim Swapping, an overview
Read Insight
September 12
/
2022
Reading Time: 10 minutes
I spy an LFI
Read Insight
June 28
/
2022
Reading Time: 3 minutes
A WAF Bypass
Read Insight
February 23
/
2022
Reading Time: 8 minutes
The Move To Logic Exploitation
Read Insight
September 23
/
2021
Reading Time: less than 1 minute
Be better at infosec - OWASP London
Read Insight
August 17
/
2021
Reading Time: 3 minutes
Penetration Test or Red Team?
Read Insight
July 29
/
2021
Reading Time: 10 minutes
Rotten Apples: MacOS Codesigning Translocation Vulnerability
Read Insight
January 19
/
2021
Reading Time: 4 minutes
Evolving attacks on healthcare in 2020 and Beyond Summary
Read Insight
October 9
/
2020
Reading Time: less than 1 minute
OWASP London/Suffolk Chapter meeting
Read Insight
July 30
/
2020
Reading Time: 3 minutes
Establishing a Beachhead
Read Insight
July 23
/
2020
Reading Time: 4 minutes
What is the future of commercial drone security?
Read Insight
May 27
/
2020
Reading Time: 4 minutes
A Security Strategy for the New Normal
Read Insight
April 11
/
2020
Reading Time: 4 minutes
More secure Zoom use
Read Insight
March 11
/
2020
Reading Time: 4 minutes
Hostage Negotiation and Cyber Security
Read Insight
February 28
/
2020
Reading Time: 5 minutes
In the race to the cloud, what could possibly go wrong?
Read Insight
January 2
/
2020
Reading Time: 3 minutes
Emerging trends in threat actor communication methods
Read Insight
November 14
/
2019
Reading Time: 2 minutes
The industry guide to being a successful “bad actor”
Read Insight
October 30
/
2019
Reading Time: 5 minutes
Tales From The Red Team Crypt – Episode 1
Read Insight
October 1
/
2019
Reading Time: 5 minutes
Everyone can be taught new tricks – considerations for application pen tests
Read Insight
September 13
/
2019
Reading Time: 3 minutes
Lessons learned from Healthcare security assessments
Read Insight
August 30
/
2019
Reading Time: 2 minutes
LinkedIn Pwnage: why we can’t all be friends
Read Insight
June 30
/
2019
Reading Time: 4 minutes
Do better penetration tests – for buyers and testers
Read Insight
April 16
/
2019
Reading Time: 2 minutes
M&A Cybersecurity
Read Insight
March 14
/
2019
Reading Time: 4 minutes
Lessons learned from working with media companies
Read Insight