Explore the Minds of The NetSPI Agents

Advance your proactive security knowledge by learning from some of the brightest people in cybersecurity. Our executive blog gives perspective on industry trends, while Hack Responsibly dives deep into the latest CVEs and tactical approaches our team takes. Take your pick!

Adversary Simulation

Pipe Dreams: Remote Code Execution via Quest Desktop Authority Named Pipe 

Discover the risks of the CVE-2025-67813 vulnerability in Quest Desktop Authority. Learn how this RCE flaw impacts your organization and how to mitigate it.

Learn More
Vulnerability Management

Ivanti Endpoint Manager Mobile (EPMM) [CVE-2026-1281 & CVE-2026-1340]: Overview & Takeaways

Ivanti has disclosed two critical zero‑day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE‑2026‑1281 and CVE‑2026‑1340. Both vulnerabilities have been exploited in active attacks and allow unauthenticated remote threat actors to compromise EPMM appliances.

Learn More
Attack Surface Management

Why Your Security Program Needs Domain Monitoring

NetSPI Domain Monitoring continuously discovers and assesses look-alike domains related to your organization, providing deep contextual intelligence including risk profiles, WHOIS records, IP details, DNS records, and certificate data. The NetSPI Platform streamlines response, enabling rapid action against high-risk domains.

Learn More
Vulnerability Management

Oracle WebLogic Server Proxy Plugin (CVE-2026-21962): Overview & Takeaways

CVE-2026-21962 allows an unauthenticated remote attacker to bypass security controls and potentially gain unauthorized access to backend WebLogic systems. Because these proxy plugins often sit in DMZ environments, the exposure is significant.

Learn More
Hardware Penetration Testing

Rust’s Role in Embedded Security 

Rust enhances memory safety in embedded systems, but rigorous security testing remains essential to address logic, hardware, and cryptographic vulnerabilities. Explore the benefits and key considerations of using Rust

Learn More
CISO Perspectives

Tackling Technical Debt before It Owns Your Roadmap 

Discover how prioritizing pentest findings and technical debt in Q1 can transform your security strategy. Read the article for actionable insights.

Learn More
AI/ML Pentesting

Webinar Recap: The AI Balancing Act: Benchmarking LLMs for Usability vs. Security

Explore how security teams balance usability and risk in LLMs, with insights on vulnerabilities, compliance, and a framework for effective AI benchmarking.

Learn More
Application Pentesting

How Secure Are Your SaaS Applications? Pentesting for SaaS Providers

Proactive SaaS pentesting protects data, ensures compliance, and builds trust. Learn best practices for securing APIs and cloud apps.

Learn More
NetSPI Updates

NetSPI Celebrates Our 2025 Partners of the Year 

Congratulations to NetSPI’s 2025 Partner of the Year Recipients Stratascale, Defy Security, VLCM, BlackLake Security, Consortium, Softcat, CDW UK, ConnexIT, and AWS.

Learn More
AI/ML Pentesting

When Your AI Provider Goes Bankrupt: 6 CISO Insights to Stay Ahead of AI Vendor Failure

AI vendor failure poses risks to data, security, and operations. Learn six CISO strategies to prepare for instability and protect your organisation effectively.

Learn More
Security Industry Trends

What Cybersecurity Actually Looks Like in 2026

Discover 2026’s top cybersecurity trends: AI, cloud, social engineering, and digital resilience. Stay ahead with a proactive security strategy.

Learn More
Penetration Testing

Pentesting for Third-Party Risk Management

 Learn why traditional third-party risk management fails and what CISOs must demand from vendors, including continuous pentesting, to manage third-party risk effectively. 

Learn More