Explore the Minds of The NetSPI Agents

Advance your proactive security knowledge by learning from some of the brightest people in cybersecurity. Our executive blog gives perspective on industry trends, while Hack Responsibly dives deep into the latest CVEs and tactical approaches our team takes. Take your pick!

Adversary Simulation

CVE-2025-21299: Unguarding Microsoft Credential Guard

Learn more about the January 2025 Patch Tuesday that addresses a critical vulnerability where Kerberos canonicalization flaws allow attackers to bypass Virtualization Based Security and extract protected TGTs from Windows systems.

Learn More
Web Application Pentesting

CVE-2025-27590 – Oxidized Web: Local File Overwrite to Remote Code Execution

Learn about a critical security vulnerability (CVE-2025-27590) in Oxidized Web v0.14 that allows attackers to overwrite local files and execute remote code execution.

Learn More
Proactive Security

Is It Worth It? Let Me Work It: Calculating the Cost Savings of Proactive Security

Discover the cost savings of proactive security solutions to support your shift from traditional vulnerability management to a risk-based approach to exposure management. 

Learn More
Web Application Pentesting

A Not So Comprehensive Guide to Securing Your Salesforce Organization

Explore key background knowledge on authorization issues and common bad practices developers may unintentionally introduce in Salesforce Orgs.

Learn More
CISO Perspectives

Let’s Talk Cybersecurity on the Agent of Influence Podcast

Ready to contribute to meaningful conversations in cybersecurity? Join Agent of Influence with Nabil Hannan, NetSPI Field CISO and podcast host.

Learn More
Penetration Testing as a Service (PTaaS)

NetSPI’s Take on Exposure Management: Our Highlights from Gartner® Hype Cycle™ for Security Operations, 2024

Learn NetSPI’s key takeaways from Gartner® Hype Cycle™ for Security Operations, 2024

Learn More
Penetration Testing as a Service (PTaaS)

Internal vs. External Penetration Testing: What You Need to Know

Internal and external penetration testing are critical components of a holistic security testing program. Learn the differences and use cases of each type.

Learn More
BAS as a Service

Redefining Breach and Attack Simulation (BAS) with BAS as a Service

Validate the effectiveness of security controls with NetSPI’s Breach and Attack Simulation as a Service. Simulate real-world attacks, benchmark detection coverage, and improve defenses.

Learn More
Adversary Simulation

The Things We Think and Do Not Say: The Future of Our Beacon Object Files (BOFs)

Learn about a reference design for a new Beacon Object Files portable executable concept and helpful features.

Learn More
Mainframe Penetration Testing

NetSPI Wins First Place at SHARE Mainframe Capture the Flag Event

Learn how NetSPI’s Mainframe Pentesting team claimed first place at SHARE’s inaugural Capture the Flag event, showcasing elite z/OS security expertise.

Learn More
External Attack Surface Visibility

Key Strategies for Tackling External Attack Surface Visibility

Hear from NetSPI Partners on how they tackle external attack surface visibility. These expert insights will help secure assets and boost cyber defense.

Learn More
Adversary Simulation

CVE-2024-28989: Weak Encryption Key Management in Solar Winds Web Help Desk

Learn how an attacker with access to a backup file could potentially recover certain encrypted passwords.

Learn More