Ready to start a project with us? Let us know what's on your mind.

1501 Broadway STE 12060
New York, NY 10036-5601

inquiry@winmill.com
1-888-711-6455

x Close

Blog

Winmill Blogs

Cloud

When is it Appropriate to Implement a Serverless Architecture?
April 21, 2023
What is Serverless?
December 20, 2022
Migrating Legacy Applications to the Cloud: Four Viable Approaches
February 25, 2022
The Benefits of a Serverless Architecture
September 1, 2021
DevOps vs. CloudOps
July 5, 2021

Cyber Security

Understanding Reflected DOM XSS Attacks: A Deep Dive into Insecure Hooks and Sinks
February 5, 2024
Wi-Fi Penetration Testing: War-Driving with Kismet
January 30, 2024
Wi-Fi Penetration Testing with Kismet and Wifite: A Checklist for Success
January 23, 2024
OSCP: The Gold Standard of Penetration Testing Certifications
December 13, 2023
Leveraging the MITRE ATT&CK Framework in Penetration Testing of Web Applications
November 27, 2023
Cross-Site Scripting (XSS) Evasion Techniques
November 15, 2023
Careers in Penetration Testing: A Deep Dive into the Trenches
October 11, 2023
Penetration Testing in the Era of AI: Opportunities and Challenges
October 3, 2023
Emerging Threats and Their Implications for Penetration Testing
September 26, 2023
The Art of Social Engineering: A Key Tool in Penetration Testing
September 18, 2023
The Crucial Role of Penetration Testing in Achieving Compliance: Navigating PCI DSS, GDPR, HIPAA and More
August 28, 2023
Red Teaming: Physical Security Penetration Testing
August 22, 2023
The Ethical Side of Penetration Testing: Navigating Legal and Ethical Boundaries
August 15, 2023
Case Study: How We Identified and Mitigated a Major Telerik UI Security Vulnerability
August 8, 2023
Modern Tools for Penetration Testing: The Essentials
August 2, 2023
Understanding Penetration Testing: An Introduction for Beginners
July 27, 2023
Securing Your Work-From-Home Network | AlienVault OSSIM Guide
June 12, 2023
Come check out Ben DiMolfetta at SecureWorld Houston on May 18, 2023
May 4, 2023
Top Penetration Testing Certifications to Boost Your Cybersecurity Career
April 30, 2023
Enhancing SOC Assessments with MITRE ATT&CK
April 20, 2023
The Social Engineer’s Toolkit (SET)
April 4, 2023
Kali Purple: A First Look at Kali Linux for Blue and Purple Teams
March 27, 2023
Beyond alert(“XSS”): Advanced Client-Side Penetration Testing with the Browser Exploitation Framework
March 22, 2023
Pen Tester’s Notebook – Part 1 – Formatting Nmap Results
December 14, 2022
Current Trends in Penetration Testing: the Impact of Changing Expectations
December 5, 2022
The MITRE ATT&CK Defender Framework: Intelligence-Driven Threat Modeling
November 23, 2022
Penetration Testing: What You Need to Know
November 15, 2022
Winmill Shares Its Accomplishments In The Micro Focus Sales Enablement Competition
November 10, 2022
Winmill Wins 2022 Apex Program Contest
November 1, 2022
Conducting Penetration Testing: 7 Steps
October 24, 2022
Is it Possible to Automate Penetration Testing?
October 13, 2022
Application Scan Identifies an SSRF Vulnerability; Penetration Test Finds Exploitation Attack Vectors
September 7, 2022
Padding Oracle Attack: Are You Vulnerable?
August 5, 2022
Low-Tech Cyber Security Threat Hunting with Bash
July 19, 2022
Winmill Employee Wins Veracode Video Contest
July 12, 2022
Veracode SCA Video Series
July 7, 2022
Cyber Security: Microsoft Office/Microsoft Support Diagnostic Tool “Follina” Vulnerability
June 23, 2022
Cyber Security: Hardened Windows Server 2016 Breached via Web Apps
June 8, 2022
Penetration Test: SYSTEM Access to MSSQL Server via SQL Injection and File Overwrite
May 3, 2022
External Pen Test Breaches Company’s Perimeter Via WordPress
March 3, 2022
Review: 4 Popular Vulnerability Aggregation Tools
February 8, 2022
How to Test Your Own Vulnerability to the Log4Shell Attack Chain in Apache Solr
December 27, 2021
Gaining system admin control in minutes, via the default credentials in Manage Engine
December 8, 2021
Penetration test reveals a vulnerability in a very popular open-source web app component: Apache Struts
November 16, 2021
Blog of a Penetration Tester: Issue 2 – Anatomy of an Effective Penetration Test Report
November 11, 2021
Blog of a Penetration Tester: Article 2 – Unique Demands of the Role
October 29, 2021
Penetration Testing vs. Vulnerability Scanning
October 5, 2021
Blog of a Penetration Tester: Article 1 – Some Important Definitions
September 28, 2021
7 Reasons Why You Need Penetration Testing
September 15, 2021
5 Best Practices to Prevent Ransomware Attacks
August 24, 2021
Winmill Cyber Security Webinar
July 7, 2021
Application Penetration Testing for Compliance: The Nine Most Common Standards
July 2, 2021

DevOps

What is Serverless?
December 20, 2022
Migrating Legacy Applications to the Cloud: Four Viable Approaches
February 25, 2022
Breaking Down a Serverless Architecture: The Back End
December 28, 2021
Breaking Down Serverless Architecture: The Middle Tier
October 29, 2021
Breaking Down Serverless Architecture: The Front End
September 24, 2021
The Benefits of a Serverless Architecture
September 1, 2021
DevOps vs. CloudOps
July 5, 2021

Software Development

When is it Appropriate to Implement a Serverless Architecture?
April 21, 2023
IATSE Logo
Home Depot Logo
Federal Aviation Administration Logo
Ernst and Young Corporate Logo
Equifax Corporate Logo
Dish Corporate Logo
American Cancer Society Logo
Volkswagen Logo
Electronic Arts Corporate Logo
Microsoft Logo
Cisco Systems logo
American Greetings Logo
J.M. Smuckers Logo
Kaiser Permanente Logo
Columbia University Logo
Yale University Logo
UPS Logo
Terumo Logo
Sprint Logo
Six Continents Logo
SAIC Logo
Radiant Logic Logo
P.F. Chang's Logo
Ohio State Logo
Iona College Logo
Harry Walker Logo
Google Logo
Duke Energy Logo
Disney Logo
Credit Suisee Logo
Booz Allen Hamilton Logo
BD Briggs Logo
Asics Logo

Interested in starting a project with us?

Let's Talk