Blog

IoT Testing

Here at Brackish, we’ve recently received inquiries from several customers in regards to testing their IoT devices. We took a look at our current roster

Read More »

Insecure Deserialization

Introduction Insecure deserialization is a cybersecurity vulnerability that affects various programming languages, including C#, Java, PHP, Python, and others. This article explores the dangers of

Read More »

Local Administrator Accounts

Local administrator accounts are commonly used in Active Directory/internal networks to manage individual computers. These accounts have full control over the local computer, which can

Read More »

TLS Versions Explained

Transport Layer Security (TLS) is a widely-used protocol for securing communications on the internet. TLS is responsible for establishing a secure and encrypted connection between

Read More »

WordPress Security

WordPress is one of the most popular content management systems (CMS) in the world, powering over 40% of all websites on the internet. However, with

Read More »

Why you need a DMZ

Why you need a DMZ In today’s interconnected world, network design and segmentation are crucial for the security and performance of an organization’s IT infrastructure.

Read More »

How ChatGPT Helps Us

How ChatGPT Helps Us Recently, Brackish was conducting a phishing engagement, and we had the idea to try out ChatGPT to help us build our

Read More »

What are Weak Hashing Algorithms

“SSL Certificate signed using weak hashing algorithm” refers to a security vulnerability in the SSL/TLS certificate used by a website. A hashing algorithm is used

Read More »

Attack Surface Management

Introduction  External attack surface management (ASM) refers to the process of identifying, analyzing, and mitigating security risks and vulnerabilities that originate from outside an organization’s

Read More »