What separates a tool from a tester? Read White Oak Security’s blog about pentesting web apps efficiently through Burp Suite Config Library with scan profiles.
A pentester at White Oak Security accesses an unauthenticated Jenkins server, an interesting target for attack, with a compromised AWS environment. Learn more…
White Oak Security’s expert pentesters share a tip in their success: learn to code! Whether you’re in cybersecurity or just curious, coding is a valuable skill.
Read Part 1 here.. Last time we talked about how you would start an application security program and I want to try to move into a discussion around how you […]
New security breaches are occurring on an almost daily basis. Attackers often gather breach data in search of attacking valid user accounts on other websites, such as the 773 million […]
Our CEO and founder, Christopher Emerson, is regularly asked to provide his expertise, opinion, and insight on a variety of cybersecurity topics. Often our clients, industry contacts, or community request […]