Intelligence tagged offensive security

Cyber Intelligence Weekly
Join Echelon’s 31K+ subscribers and stay current on cybersecurity trends and insights.
What Is a Red Team Exercise? Insights for Executives and Engineers 
What Is a Red Team Exercise? Insights for Executives and Engineers 
Discover what a red team exercise is, how long it takes, and what findings executives and engineers should expect. Learn how offensive security testing improves detection, response, and resilience. 
Posted on Sep 01 / 2025
On-Demand: Uncovering the Layers of Offensive Cybersecurity  
On-Demand: Uncovering the Layers of Offensive Cybersecurity  
Join us live on August 27th to explore what really makes cybersecurity effective. Offensive security experts break down tool limitations, internal practices, and real-world defense strategies.
Posted on Jul 18 / 2025
Red vs. Purple Teaming: What Security Leaders Are Getting Right - and Wrong 
Red vs. Purple Teaming: What Security Leaders Are Getting Right - and Wrong 
Learn the real differences between red and purple teaming and how to use each to strengthen your cybersecurity program. Watch the full webinar on demand. 
Posted on Jul 09 / 2025
On-Demand: Manage Leveling Up Your Defenses: The Power of Red and Purple Teaming
On-Demand: Manage Leveling Up Your Defenses: The Power of Red and Purple Teaming
Discover how red and purple teaming together can boost your cybersecurity defenses. Join our expert panel to explore real-world scenarios, improve detection and response, and build a stronger offensive security program.
Posted on Apr 21 / 2025
Top 10 Considerations for PCI in 2025
Top 10 Considerations for PCI in 2025
Stay ahead of PCI DSS 4.0 compliance requirements with Echelon Risk + Cyber. Our PCI DSS Readiness Assessments help identify gaps, streamline remediation, and ensure a smooth audit process. 
Posted on Mar 19 / 2025
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Discover how sophisticated social engineering attacks are leveraging legitimate Microsoft tools and services to deploy ransomware. Learn about recent phishing campaigns, Microsoft Teams vishing and effective cybersecurity measures to protect your organization. 
Posted on Mar 04 / 2025
Cybersecurity Trends and Predictions for 2025: Expert Insights to Stay Ahead 
Cybersecurity Trends and Predictions for 2025: Expert Insights to Stay Ahead 
Discover the key cybersecurity predictions for 2025 as industry experts explore the transformative role of AI, the critical importance of employee training, navigating compliance challenges, and strategies to counter evolving threats like ransomware and social engineering. 
Posted on Dec 04 / 2024
New PAN-OS Vulnerability Exposed: Steps to Defend Your Network 
New PAN-OS Vulnerability Exposed: Steps to Defend Your Network 
Learn more about the critical vulnerability found recently in the PAN-OS management interface by the CISA. 
Posted on Nov 21 / 2024
From Vulnerability Assessments to Red Teaming: Choosing the Right Cybersecurity Assessment
From Vulnerability Assessments to Red Teaming: Choosing the Right Cybersecurity Assessment
Choosing the right offensive cybersecurity service can be challenging, especially with options like red teaming, penetration testing, and vulnerability assessments that often appear overlapping. Each service, however, serves a distinct purpose and addresses different aspects of your security needs. To help you make an informed decision, let’s explore the differences between these services and how they align with your organization’s specific cybersecurity goals.
Posted on Sep 30 / 2024
The Latest in FedRAMP Compliance: Breaking Down Red Teaming for Enhanced Security
The Latest in FedRAMP Compliance: Breaking Down Red Teaming for Enhanced Security
FedRAMP announced a new red team requirement impacting cloud service providers. This article breaks down the details of the requirement and the difference between red teaming and pen testing.
Posted on Apr 18 / 2024
Hackin’ SaaS – Echelon’s Top 10 Web App Vulnerabilities
Hackin’ SaaS – Echelon’s Top 10 Web App Vulnerabilities
Echelon's Offensive Security (OffSec) team of ethical hackers conducts daily penetration tests on web applications, uncovering common vulnerabilities that threaten online security. In this article, we explore the top 10 web app vulnerabilities frequently encountered during penetration tests. From SQL injection to CORS misconfigurations, we'll delve into each vulnerability and discuss how to both exploit and safeguard against them.
Posted on Sep 13 / 2023
eLearnSecurity Web Application Penetration Tester (eWPT): Overview and How to Prepare for the Exam
eLearnSecurity Web Application Penetration Tester (eWPT): Overview and How to Prepare for the Exam
Prepare for the eLearnSecurity Web Application Penetration Tester (eWPT) exam with this comprehensive guide. Learn about the exam format, prerequisites, and tips to pass the practical and written assessments. Acquire valuable web application penetration testing skills and enhance your professional profile.
Posted on Aug 01 / 2023
Network Pivoting and the eCPPT Exam
Network Pivoting and the eCPPT Exam
Learn about network pivoting techniques for the eCPPT exam and penetration testing. Understand the concept of pivoting, explore tools like Metasploit, Proxychains, SOCKS Proxy, Chisel, and Ligolo-ng, and discover the differences between reverse shells and bind shells.
Posted on Jul 05 / 2023
Cyber Definition Problems: Red Teaming vs. Penetration Testing
Cyber Definition Problems: Red Teaming vs. Penetration Testing
Cybersecurity terms like "red teaming" and "penetration testing" are often used interchangeably, leading to confusion and misinformation. This article explores the differences between these assessments and why the misuse of terms can be detrimental to the industry.
Posted on Apr 17 / 2023
Pen Testing is Not Enough – Red Teaming Assessments in Healthcare
Pen Testing is Not Enough – Red Teaming Assessments in Healthcare
Learn why pen testing alone isn't enough to secure healthcare organizations from cyber threats, and how red team assessments can help identify and mitigate vulnerabilities. Here's a comprehensive overview of red teaming and its importance in healthcare cybersecurity.
Posted on Mar 14 / 2023
eLearnSecurity Certified Professional Penetration Tester (eCPPT): Overview and How to Prepare for the Exam
eLearnSecurity Certified Professional Penetration Tester (eCPPT): Overview and How to Prepare for the Exam
Preparing for the eLearnSecurity Certified Professional Penetration Tester (eCPPTv2) exam? Here are three experiences from the Echelon Offensive Security Team and tips on how to prepare.
Posted on Mar 06 / 2023
eJPTv2 Certification: Overview and How to Prepare for the Exam
eJPTv2 Certification: Overview and How to Prepare for the Exam
A few weeks ago, I received an email stating that I had passed the eJPTv2 certification. I wanted to share my perspective on the exam, what’s covered in the eJPTv2 syllabus, and how to prepare for it in this eJPT exam review.
Posted on Feb 16 / 2023
DEF CON 30 in Review: How the Echelon Team Won a Black Badge, and a Black Badge Breakdown
DEF CON 30 in Review: How the Echelon Team Won a Black Badge, and a Black Badge Breakdown
Buckle up for the story of how the Echelon team won the coveted DEF CON Black Badge, and dive deep into Ross Flynn's detail breaking down the Black Badge.
Posted on Sep 13 / 2022
Log4shell: How Attackers are (Currently) Breaking the Internet, and How to Mitigate
Log4shell: How Attackers are (Currently) Breaking the Internet, and How to Mitigate
Websites are like buildings. If your website's foundation is vulnerable to Log4j, check out this overview of the attack, how to test for it, and how to mitigate it.
Posted on Dec 16 / 2021
Four Ways to Spice Up Your Penetration Testing Routine
Four Ways to Spice Up Your Penetration Testing Routine
Another year, another penetration test? Attackers are evolving, and so should you. Here are four ways to spice up your pen testing routine to be better prepared and reduce your attack surface.
Posted on Sep 22 / 2021
DefCon 29 in Review: The Best Sessions, Badge Spoilers and More
DefCon 29 in Review: The Best Sessions, Badge Spoilers and More
Have you solved your badges yet? With another DefCon in the books, here's our take on the best sessions and a close up look at some of the badges.
Posted on Aug 26 / 2021
Cyber Intelligence Weekly (Aug 15, 2021): Our Take on Three Things You Need to Know
Cyber Intelligence Weekly (Aug 15, 2021): Our Take on Three Things You Need to Know
This weekly post shares our intel around some of the major developments on the future of cybersecurity. This week: data breach at T-Mobile, Apple's privacy nightmare, and Microsoft needs to patch patching.
Posted on Aug 16 / 2021
Flexible & Secure Remote Penetration Testing in a Changing World
Flexible & Secure Remote Penetration Testing in a Changing World
Over the past year and a half, the worldwide workforce underwent a drastic and rapid paradigm shift that has brought with it new opportunities, attack vectors, and methods to test security. When testing security with penetration testing, partner with a firm using the most modern, advanced tactics to test your readiness for tomorrow’s attackers.
Posted on Jul 29 / 2021
Are you ready to get started?