Explore the Minds of The NetSPI Agents

Advance your proactive security knowledge by learning from some of the brightest people in cybersecurity. Our executive blog gives perspective on industry trends, while Hack Responsibly dives deep into the latest CVEs and tactical approaches our team takes. Take your pick!

Penetration Testing as a Service (PTaaS)

Penetration Testing for Compliance: Achieving SOC 2, PCI DSS, and HIPAA

Discover how penetration testing ensures compliance with SOC 2, PCI DSS, and HIPAA, safeguarding data, mitigating risks, and building trust in a data-driven world.

Learn More
Cloud Pentesting

Automating Azure App Services Token Decryption

Discover how to decrypt Azure App Services authentication tokens automatically using MicroBurst’s tooling to extract encrypted tokens for security testing.

Learn More
BAS as a Service

3 Lessons Learned from Simulating Attacks in the Cloud

Learn key lessons from NetSPI’s work simulating attacks in the cloud. Learn how Breach and Attack Simulation improves cloud security, logging, and detection capabilities.

Learn More
Red Teaming

CVE-2025-4660: Forescout SecureConnector RCE 

Learn about the high-risk RCE vulnerability in Forescout SecureConnector allows attackers to turn security agents into C2 channels.

Learn More
Red Teaming

Part 2: Ready for Red Teaming? Crafting Realistic Scenarios Reflecting Real-World Threats 

Learn to craft realistic red team scenarios that reflect real-world threats. Gain actionable insights to strengthen detection and response capabilities.

Learn More
Secure Code Review

Detecting Authorization Flaws in Java Spring via Source Code Review (SCR)

Discover how secure code review catches privilege escalation vulnerabilities in Java Spring apps that pentests miss – identify insecure patterns early.

Learn More
Network Pentesting

Set Sail: Remote Code Execution in SailPoint IQService via Default Encryption Key

NetSPI discovered a remote code execution vulnerability in SailPoint IQService using default encryption keys. Exploit details, discovery methods, and remediation guidance included.

Learn More
Attack Surface Management (ASM)

Dark Web Monitoring And Why Your EASM Strategy Depends On It

Organizations face threats beyond their perimeter. Explore how dark web monitoring, breach data tracking, and public exposure detection strengthen your EASM strategy.

Learn More
Cloud Pentesting

Extracting Sensitive Information from Azure Load Testing

Learn how Azure Load Testing’s JMeter JMX and Locust support enables code execution, metadata queries, reverse shells, and Key Vault secret extraction vulnerabilities.

Learn More
Proactive Security

3 Key Takeaways from Continuous Threat Exposure Management (CTEM) For Dummies, NetSPI Special Edition

Discover continuous threat exposure management (CTEM) to learn how to bring a proactive approach to cybersecurity and prioritize the most important risks to your business.

Learn More
Penetration Testing as a Service (PTaaS)

How Often Should Organizations Conduct Penetration Tests?

Learn how often organizations should conduct penetration tests. Discover industry best practices, key factors influencing testing frequency, and why regular pentesting is essential for business security.

Learn More
Mainframe Penetration Testing

Mainframe State of the Platform: 2025 Security Assessment

Learn key insights into mainframe security in 2025, including trends, gaps, and strategies to enhance protection for critical enterprise systems.

Learn More