
Introducing Randori Integrations Marketplace
Today, Randori is thrilled to announce the launch of our new Integrations Marketplace. The Integrations Marketplace is a new feature available inside the Randori Offensive Security
2022 The State of Attack Surface Management
Today, Randori is thrilled to announce the launch of our new Integrations Marketplace. The Integrations Marketplace is a new feature available inside the Randori Offensive Security
What is CVE-2022-1388? CVE-2022-1388 is a critical vulnerability (CVSS 9.8) in the management interface of F5 Networks’ BIG-IP solution that enables an unauthenticated attacker to
The 2022 NCCDC season has come to an end. As a founding member of the NCCDC Red Team, I have been volunteering at this event
When it comes to protecting your organization from cyber threats, a well armed attacker is typically your worst nightmare. But if you work for a
The 2022 NCCDC season has come to an end. As a founding member of the NCCDC Red Team, Randori’s Director of Offense, Evan Anderson, has been
Hiring cybersecurity talent in today’s environment can be incredibly challenging. But establishing a red team can be even trickier, because finding the right talent can
Attack Surface Management is a practice within the offensive cybersecurity field that has been rapidly gaining popularity in recent years. More and more CISOs and
In our latest report, The State of Offensive Security 2022, we provide insight into what we discovered about how well organizations have adopted the offensive
In 1871, military theorist Helmuth von Moltke wrote, “no battle plan survives contact with the enemy.” Because cybercriminals will do trillions in damage this
The financial services industry faces the dual challenge of being highly targeted by threat actors and highly regulated. While compliance is not security, security should
Log4j feels like a decade ago, but we’re still getting asked about it, months later. The industry rallied as fast as it could to apply
Dynamic, sprawling, and constantly fermenting new vulnerabilities, the typical organization’s attack surface can be challenging to measure. While defenders plan out what their defenses are