Blog

Depth Security Blog

Blog

Penetration Testing
Industries
Case Studies
Company
Resources
Contact Us

Penetration Testing

https://depthsecurity.com/

Tools

H3

H4

H5
H6
Screen shot of connectivity and security settings for wireless infrastructure

Securing Wireless Infrastructure – Part 1

  Intro The wireless security landscape has remained largely unchanged since the development of Wi-Fi...
Read More
Depth Security logo

Indicators Of Poor Assessment Work

In the 11+ years Depth has been in business we’ve had the opportunity to see...
Read More
Screenshot of Spray 365 in action the Office 365 password spraying solution

Spray 365: A New Twist On Office 365 Password Spraying

TL;DR The current state of password spraying Office 365 accounts could benefit from new approaches...
Read More
Defeating Av

Classic API Unhooking To Bypass EDR Solutions

Intro This blog post will be covering the classic technique used to unhook Windows APIs...
Read More
Dllinjeciton

Reflective DLL Injection In C++

TL;DR Implant with our encrypted DLL -> allocates memory for the DLL -> put the...
Read More
Depth Security logo

Selecting A Penetration Testing Provider – PART 2

In last week’s blog, I started outlining some of the considerations when choosing a penetration testing...
Read More
Depth Security logo

Selecting A Penetration Testing Provider – PART 1

Recently, I received a call from a long-time friend of mine with who I had...
Read More
Applocker Image

Bypassing App Locker & CLM While Evading EDR

Introduction The  last blog post I wrote got way more recognition than I expected and...
Read More
Cartoon of a snake with word balloon talking about malicious documents

Obfuscating Malicious, Macro-Enabled Word Docs

Overview I was working on my OSEP certification when I was inspired to stop studying...
Read More

Be Proactive with Protecting Patient Data

Healthcare organizations are increasingly targeted by a range of cybersecurity threats, meaning safeguarding patient data requires a combination of advanced security technologies and a proactive approach. One effective strategy is penetration testing, which helps identify and address vulnerabilities before they can be exploited by malicious actors.

Depth Security specializes in providing these critical assessments, helping healthcare providers strengthen their defenses and better protect both their systems and patients’ sensitive information. With the right security measures in place, organizations can stay ahead of evolving cyber threats and ensure the continuity of care.