Loading

Category: Security

  • Blog
  • Category: Security

LLM Supercharged Our Penetration Testing

We’ve always believed that penetration testing isn’t just about running scanners and checking boxes. It’s about thinking like an attacker — anticipating logic flaws, chaining vulnerabilities, and uncovering what automated tools miss. The Challenge: A “Secure” API Endpoint A Toronto-based fintech client came to us with an API they believed was hardened. They had: Our

Read More

Bypassing File Upload Restrictions We Once Thought Were Unbreakable

File upload vulnerabilities are among our most frequently discovered attack surfaces — and also some of the most frustrating to exploit. Clients often believe they’ve “secured” their upload functionality with basic checks: file extension filtering, MIME-type validation, size limits, and antivirus scanning. But in 2026, we’ve found that AI is rewriting the rules of how these restrictions

Read More

How AI Transformed Our Penetration Testing Approach

We’ve always prided ourselves on delivering thorough, manual penetration tests that uncover vulnerabilities automated scanners often miss. But in early 2025, we began integrating AI-assisted exploitation techniques into our engagements — and the results have been nothing short of revolutionary. The Problem: Manual Testing Bottlenecks Traditional pen testing workflows involve hours spent manually exploring attack

Read More

External Penetration Tests

Penetration testing, also known as pen testing, is the practice of simulating a cyber attack on a computer system, network, or web application to test its defenses and identify vulnerabilities that an attacker could exploit. There are two main types of penetration tests: internal and external. Internal penetration tests focus on testing the security of

Read More