Packetlabs is a North American based penetration testing company that improves your company's cybersecurity posture with state of the art penetration testing| Packetlabs
What can companies learn from the Qantas Australian airline cyber breach? Learn more about incident response planning, key dwell time metrics, and more today.| Packetlabs RSS Feed
What happens when a software meant to secure meets insecure deployment? Packetlabs ethical hackers Eric Salario and Chance Pearson review CYRISMA Sensor Version 2.5 for Windows.| Packetlabs RSS Feed
Toys "R" Us customers have been notified of a breach that has disclosed personally identifiable information. Read more about what companies can learn from this breach.| Packetlabs RSS Feed
How did the Jaguar Land Rover breach cost the British economy billions? Learn more about what industries can do to strengthen their supply chain defenses.| Packetlabs RSS Feed
In this guide, learn why IoT Penetration Testing is an invaluable cybersecurity exercise to meet regulatory guidelines, ensure insurance parameters are met, and fortify your cyber roadmap.| Packetlabs RSS Feed
A PoC has been released for the Linux-PAM vulnerability. Learn more about the next steps for those impacted by CVE-2025-6018.| Packetlabs RSS Feed
Learn how (and why) to safeguard your APIs in this comprehensive guide to API Penetration Testing.| Packetlabs RSS Feed
Learn how (and why) to safeguard your mobile applications in this comprehensive guide to Mobile Penetration Testing.| Packetlabs RSS Feed
Read more about what PII was exposed in LNER's September 2025 cyber breach (and the key takeaways for the industry at large.)| Packetlabs RSS Feed
Learn more about the imminent risk to federal agencies after a potential October 2025 supply chain breach (and the top takeaways from emergency directive 26-01.)| Packetlabs RSS Feed
Today, our certified ethical hackers provide a guide to replay attacks and how to defend against them in 2024 and beyond.| Packetlabs RSS Feed
Learn how COM hijacking works, the discovery process, and PoC for SharpCOM in this technical guide by Packetlabs Offensive Security Lead Joseph Yim.| Packetlabs
A false positive in penetration testing triggers a false alarm when a security testing tool mistakenly flags a vulnerability. Here's why it's a concern and what you can do to reduce false positives.| www.packetlabs.net
What is the importance of developing an incident response plan, and how can an IRP save your organization from financial, security, and reputation-related disaster? Read on to learn more.| www.packetlabs.net
Here are the top metrics that matter after a breach (from dwell time to impact), alongside which statistics matter most to customers, key stakeholders, and regulators.| Packetlabs RSS Feed
What is attack dwell time? Learn more about why Purple Teaming is a proactive cybersecurity activity that improves defensive skills and helps reduce dwell time to better protect your organization.| Packetlabs RSS Feed
Learn more about the benefits of Thick Client Penetration Testing, its definition, its application, and more.| Packetlabs RSS Feed
Learn about the top post-breach strategies (and learn why damages don't just occur in the first 72 hours, but months or even years post-breach.)| Packetlabs RSS Feed
The recent Asahi cyber incident outlines key supply chain cyber preparedness insights for teams across all industries.| Packetlabs RSS Feed
What are the benefits of IoT Penetration Testing? Learn about why IoT Pentesting is a critical component of any cyber roadmap.| Packetlabs RSS Feed
What tactics should be used when avoiding burnout in cybersecurity teams? We detail the top strategies to mitigate burnout in cyber professionals before it impacts performance.| Packetlabs
Packetlabs offers CREST-certified, 100% tester-driven OT cybersecurity assessments to a wide range of industries across North America.| Packetlabs
Industrial Control Systems (ICS) are crucial for automating and managing manufacturing, production, and data acquisition. Despite this, ICS's continue to struggle with security issues.| www.packetlabs.net
Learn the tactics of Scattered Spider, a youthful hacker group deploying ransomware against major corporations using a diverse set of sophisticated social engineering, low and highly skilled attacks.| Packetlabs
What you need to know regarding the LNER cyberattack and subsequent uptick in social engineering attacks on LNER passengers.| Packetlabs RSS Feed
The benefits of API Penetration Testing make it a critical part of any cybersecurity roadmap. Learn more about how and why to implement it as part of your cyber strategy.| Packetlabs RSS Feed
Learn more about the alert issued by the FBI regarding recent targeted cyber campaigns against Salesforce users.| Packetlabs RSS Feed
Learn more about the critical cybersecurity solutions for law enforcement, including, but not limited to, specified penetration testing and Incident Response Plan training.| Packetlabs RSS Feed
Learn more about the top takeaways from the recent attack on Canadian federal agencies (and why organizations must go beyond MFA to protect PII.)| Packetlabs RSS Feed
The relationship between time to identify and contain a breach, cost and consumer trust are directly related; the longer the time, the higher the cost.| Packetlabs RSS Feed
Learn more about the top takeaways from the recent OT attacks on Jaguar Land Rover.| Packetlabs
MSPs have become key to improving operations and reducing enterprise costs. However, they have recently begun to be targeted by hackers. Here's why and what you can do to avoid these threats.| www.packetlabs.net
Black Hat's annual SecTor 2025 cybersecurity conference is fast approaching. Here are your top takeaways to maximize learnings from this year's event.| Packetlabs RSS Feed
What is the role of AI in penetration testing? Learn more about its common usages (and pitfalls) in 2025.| Packetlabs RSS Feed
Learn more about the lessons from the recent Nevada cyberattack in August 2025 that resulted in a temporary statewide shutdown.| Packetlabs RSS Feed
Learn more about PromptLock, the first AI-powered ransomware using OpenAI (and its associated security threats.)| Packetlabs RSS Feed
Learn more about the ongoing credential harvesting campaign targeting ScreenConnect cloud administrators around the globe.| Packetlabs
From spear phishing to smishing, learn 7 common phishing attacks and proven anti-phishing strategies to protect your business and employees.| Packetlabs
Spot fake emails, suspicious URLs, and phishing sites. Discover tools, training, and expert strategies to keep your organization secure.| Packetlabs
This Penetration Testing Guide includes everything you need to know to successfully plan, scope and execute your infrastructure penetration tests.| www.packetlabs.net
Learn the top cybersecurity takeaways and cyberattack statistics from IBM's 2025 X-Force Threat Intelligence Index.| Packetlabs RSS Feed
What really happens after a breach? We walk through what happens minute by minute, hour by hour, day by day, from the moment of discovery through the end of the third day.| Packetlabs RSS Feed
Learn about the primary tools, techniques, methodologies, and key outcomes surrounding Assumed Breach Penetration Testing (and when to know your organization is ready to invest.)| Packetlabs RSS Feed
In August 2025, a cyberattack shook Canada’s federal government after the House of Commons confirmed it was targeted in a deliberate cyberattack by an as-yet unidentified “threat actor.” Learn more.| Packetlabs RSS Feed
One of the top lessons from assumed breach simulations is that the cost of detection delays surpasses just the financial. Learn more about how CISOs can leverage assumed breach methodologies.| Packetlabs RSS Feed
Learn more about the top takeaways from Black Hat USA 2025.| Packetlabs RSS Feed
Learn how threat actors utilize command and control operations to evade detection (and how Packetlabs circumvents these evasion techniques.)| Packetlabs
Reverse engineers rely on binary diffing for malware and vulnerability analysis and more. Here are 7 open-source tools that offer advanced capabilities for analyzing code-level changes in binary executables.| Packetlabs RSS Feed
Read how a critical zero-day remote code execution vulnerability (CVE‑2025‑53770) in on-premises Microsoft SharePoint servers is currently being exploited in large-scale cyberattacks.| Packetlabs RSS Feed
Loader malware plays a critical role in the middle stages of the cyber attack lifecycle. Explore how attackers use it to import various types of malware in the attacker's environment while evading detection.| Packetlabs RSS Feed
Learn the OSI conceptual model and its seven layers to better understand network communications, and plan defensive security operations such as penetration testing campaigns, and threat modelling.| Packetlabs
Cybersecurity researchers have discovered a new exploit dubbed PerfektBlue that potentially allows attackers to remotely control millions of connected cars.| Packetlabs RSS Feed
Learn how four have been arrested in connection with the wide-scale M&S and Co-op cyberattacks (and how cyber criminals are being prosecuted in 2025 and beyond.)| Packetlabs RSS Feed
Discover how WPA3 strengthens Wi-Fi security, with enhanced protection against password cracking, encrypted public networks, and improved privacy.| Packetlabs RSS Feed
The OWASP CI/CD Top 10 identifies the most critical DevOps risks. See how these security practices can safeguard your pipeline and prevent malicious code from reaching downstream customers.| Packetlabs
Achieve several vital objectives related to your organization’s security posture with a CIS Benchmark Audit.| Packetlabs
Learn about the role of POSIX signals on Linux and UNIX systems, common signals, and secure handling practices.| Packetlabs RSS Feed
The Ontario Health atHome data breach is more than just another cybersecurity incident—it’s a cautionary tale for every organization entrusted with safeguarding personal information.| Packetlabs RSS Feed
As geopolitical tensions escalate and cyberwarfare becomes a staple of modern conflict, nation-state cyber actors pose an increasingly credible threat to U.S. critical infrastructure.| Packetlabs RSS Feed
Lateral Movement refers to the techniques used by attackers to search for sensitive or high-value assets after gaining initial access.| Packetlabs
Learn more about what the cyberattack on wholesale grocery distributor UNFI reveals about the U.S grocery industry's cybersecurity posture.| Packetlabs RSS Feed
As geopolitical tensions between Israel and Iran escalate into open conflict, critical infrastructure in the United States is at heightened risk. Learn more about preventative action today.| Packetlabs RSS Feed
Hacking community The Com signals advancements in both ransomware and social engineering. Learn more about what executives can do to stay ahead of related emerging threats.| Packetlabs RSS Feed
What is an initial access broker? With the emergence of Ransomware as a Service, operators often rely on initial access brokers to obtain an initial foothold on the network. Learn more today.| Packetlabs RSS Feed
Lateral Movement refers to the techniques used by attackers to search for sensitive or high-value assets after gaining initial access.| Packetlabs RSS Feed
Learn more about how Packetlabs can help fortify your organization against cybersecurity's top threats.| Packetlabs
Would you like to learn more?| www.packetlabs.net
Learn how Packetlabs ethical hackers discovered flaws in ConnectWise's legacy VA solution, alongside key takeaways organizations can leverage to strengthen their security posture.| Packetlabs
Red Teaming insider threats helps expose blind spots in your internal security. Learn how to detect, simulate, and protect against malicious or negligent actions from trusted insiders.| Packetlabs RSS Feed
Recovery sabotage is now a core part of ransomware playbooks. Discover how attackers remove volume shadow copies, corrupt backups, and disable Windows repair tools to block victim response efforts.| Packetlabs RSS Feed
Claroty’s 2025 report reveals nearly every healthcare organization analyzed had IoMT devices with Known Exploited Vulnerabilities. Learn how these risks are exposing critical patient systems.| Packetlabs RSS Feed
Learn how the tool Upload_Bypass automates the process of bypassing file upload filters, helping pentesters detect and exploit CWE-434 flaws that can lead to RCE, persistence, and lateral movement.| Packetlabs RSS Feed
Learn how cold boot and evil maid attacks exploit physical access to bypass encryption and extract sensitive data—and discover effective strategies to secure your devices.| Packetlabs RSS Feed
Technical Debt can escalate cybersecurity risks and leave gaps in security posture and reduce productivity. Learn how to identify and mitigate it to safeguard your organization from tech debt.| Packetlabs RSS Feed
Demystify threat actor names (and common cybersecurity naming conventions) in today's article.| Packetlabs RSS Feed
SuperCard X malware exploits Android NFC features to capture payment card details. Discover how social engineering drives this new wave of fast-paced financial fraud.| Packetlabs RSS Feed
Read more about the findings from the Canadian Cyber Centre’s National Cyber Threat Assessment 2025–2026.| Packetlabs RSS Feed
LLM security risks grow with advanced jailbreak techniques like Many-shot, Deceptive Delight, and PAIR. Discover how attackers bypass AI safety measures and how to mitigate these emerging threats.| Packetlabs RSS Feed
Read more about SessionShark, a powerful PhaaS toolkit used to bypass MFA protections in Microsoft 365 via advanced phishing and proxy methods.| Packetlabs RSS Feed
Learn about a new attack technique where malicious Chrome extensions morph into trusted apps, tricking users with phishing attacks, stealing passwords and data, and then disappearing without a trace.| Packetlabs RSS Feed
With over 82% of breaches originating from the cloud in 2025, HubSpot’s cybersecurity team recognized that proactive penetration testing was critical to identify risks.| Packetlabs RSS Feed
To ensure that they continue to stay on the forefront of security, AL partnered with Packetlabs to perform advanced testing on their widely-used applications for lottery machines.| Packetlabs RSS Feed
Discover 5 AI-powered cybersecurity tools that support red teaming, threat detection, and vulnerability discovery efforts.| Packetlabs RSS Feed
Deny-lists may seem effective, but attackers have a history of bypassing them. Learn why accept-lists offer stronger protection, and explore when each method is appropriate in cybersecurity defense.| Packetlabs RSS Feed
Discover how corporate mutiny can threaten your organization’s cybersecurity. Learn to spot early signs, prevent insider attacks, and address leadership issues to protect against cyber risks.| Packetlabs RSS Feed
Today, Packetlabs's ethical hackers take a look at how the attack against ByBit took place and review the different crypto-wallet types such as hot, cold, and custodial work.| Packetlabs RSS Feed
Deepfakes are fueling financial fraud, misinformation, and social engineering attacks. Learn about the back and forth high-tech battle in the escalating deepfake cybersecurity challenge.| Packetlabs RSS Feed
A new ClearFake variant deceives victims with fake reCAPTCHA challenges and bypasses with smart-contract ABIs tricking users into running PowerShell malware. Learn how it works and how to defend.| Packetlabs RSS Feed
Learn more about cybersecurity threats to the renewable energy industry prevalent in 2025 (and how proactive Offensive Security can work to mitigate risks before they become headlines.)| Packetlabs RSS Feed
As the pace of mergers and acquisition-related activity accelerates, so does the complexity of integrating diverse cybersecurity-related systems, processes, and cultures.| Packetlabs RSS Feed
Visit Packetlabs at ATLSECCON 2025 this April 10th - 11th to learn more about cybersecurity trends impacting not just Atlantic Canada, but the world at large.| Packetlabs RSS Feed
Discover the hidden dangers of ANSI escape sequences in terminal applications. Learn how these vulnerabilities have been weaponized, as revealed at DEFCON by the security researcher STÖK.| Packetlabs RSS Feed
Recent surveys show that 25% of people have fallen victim to job scams at least once, while 45% say recognizing and avoiding these fraudulent offers is the greatest challenge in their job search.| Packetlabs RSS Feed
Do you know how to identify fake websites in 2025 and beyond? Fraudulent websites are an integral part of nearly all sophisticated phishing scams— and they’re only getting more prevalent.| Packetlabs RSS Feed
The ethical hackers at Packetlabs provide a comprehensive guide to Social Engineering Security Testing.| Packetlabs RSS Feed
On the heels of an urgent warning being issued for hundreds of millions of Chrome, Edge, and Safari users, our ethical hackers have compiled a foundational guide for how to defend against clickjacking in 2025.| Packetlabs RSS Feed
Learn about the top cybersecurity threats in 2025 (so far) and what steps your organization can take to prevent or mitigate them.| Packetlabs RSS Feed
This article explores recent security vulnerabilities found in RedNote, a rising social media app, and examines the risks of data breaches and interception due to inadequate security measures.| Packetlabs RSS Feed
Discover the top strategies attackers have used to target the SWIFT banking system and how financial institutions can enhance security to prevent fraud with SWIFT Payment Controls (PCS).| Packetlabs RSS Feed