Ready to start a project with us? Let us know what's on your mind.

1501 Broadway STE 12060
New York, NY 10036-5601

inquiry@winmill.com
1-888-711-6455

    Select Service(s)*

    x Close

    Blog

    Winmill Blogs

    Cloud

    When is it Appropriate to Implement a Serverless Architecture?
    April 21, 2023
    What is Serverless?
    December 20, 2022
    Migrating Legacy Applications to the Cloud: Four Viable Approaches
    February 25, 2022
    The Benefits of a Serverless Architecture
    September 1, 2021
    DevOps vs. CloudOps
    July 5, 2021

    Cyber Security

    Understanding Reflected DOM XSS Attacks: A Deep Dive into Insecure Hooks and Sinks
    February 5, 2024
    Wi-Fi Penetration Testing: War-Driving with Kismet
    January 30, 2024
    Wi-Fi Penetration Testing with Kismet and Wifite: A Checklist for Success
    January 23, 2024
    OSCP: The Gold Standard of Penetration Testing Certifications
    December 13, 2023
    Leveraging the MITRE ATT&CK Framework in Penetration Testing of Web Applications
    November 27, 2023
    Cross-Site Scripting (XSS) Evasion Techniques
    November 15, 2023
    Careers in Penetration Testing: A Deep Dive into the Trenches
    October 11, 2023
    Penetration Testing in the Era of AI: Opportunities and Challenges
    October 3, 2023
    Emerging Threats and Their Implications for Penetration Testing
    September 26, 2023
    The Art of Social Engineering: A Key Tool in Penetration Testing
    September 18, 2023
    The Crucial Role of Penetration Testing in Achieving Compliance: Navigating PCI DSS, GDPR, HIPAA and More
    August 28, 2023
    Physical Security Penetration Testing
    August 22, 2023
    The Ethical Side of Penetration Testing: Navigating Legal and Ethical Boundaries
    August 15, 2023
    Case Study: How We Identified and Mitigated a Major Telerik UI Security Vulnerability
    August 8, 2023
    Modern Tools for Penetration Testing: The Essentials
    August 2, 2023
    Understanding Penetration Testing: An Introduction for Beginners
    July 27, 2023
    Securing Your Work-From-Home Network | AlienVault OSSIM Guide
    June 12, 2023
    Come check out Ben DiMolfetta at SecureWorld Houston on May 18, 2023
    May 4, 2023
    Top Penetration Testing Certifications to Boost Your Cybersecurity Career
    April 30, 2023
    Enhancing SOC Assessments with MITRE ATT&CK
    April 20, 2023
    The Social Engineer’s Toolkit (SET)
    April 4, 2023
    Kali Purple: A First Look at Kali Linux for Blue and Purple Teams
    March 27, 2023
    Beyond alert(“XSS”): Advanced Client-Side Penetration Testing with the Browser Exploitation Framework
    March 22, 2023
    Pen Tester’s Notebook – Part 1 – Formatting Nmap Results
    December 14, 2022
    Current Trends in Penetration Testing: the Impact of Changing Expectations
    December 5, 2022
    The MITRE ATT&CK Defender Framework: Intelligence-Driven Threat Modeling
    November 23, 2022
    Penetration Testing: What You Need to Know
    November 15, 2022
    Winmill Shares Its Accomplishments In The Micro Focus Sales Enablement Competition
    November 10, 2022
    Winmill Wins 2022 Apex Program Contest
    November 1, 2022
    Conducting Penetration Testing: 7 Steps
    October 24, 2022
    Is it Possible to Automate Penetration Testing?
    October 13, 2022
    Application Scan Identifies an SSRF Vulnerability; Penetration Test Finds Exploitation Attack Vectors
    September 7, 2022
    Padding Oracle Attack: Are You Vulnerable?
    August 5, 2022
    Low-Tech Cyber Security Threat Hunting with Bash
    July 19, 2022
    Winmill Employee Wins Veracode Video Contest
    July 12, 2022
    Veracode SCA Video Series
    July 7, 2022
    Cyber Security: Microsoft Office/Microsoft Support Diagnostic Tool “Follina” Vulnerability
    June 23, 2022
    Cyber Security: Hardened Windows Server 2016 Breached via Web Apps
    June 8, 2022
    Penetration Test: SYSTEM Access to MSSQL Server via SQL Injection and File Overwrite
    May 3, 2022
    External Pen Test Breaches Company’s Perimeter Via WordPress
    March 3, 2022
    Review: 4 Popular Vulnerability Aggregation Tools
    February 8, 2022
    How to Test Your Own Vulnerability to the Log4Shell Attack Chain in Apache Solr
    December 27, 2021
    Gaining system admin control in minutes, via the default credentials in Manage Engine
    December 8, 2021
    Penetration test reveals a vulnerability in a very popular open-source web app component: Apache Struts
    November 16, 2021
    Blog of a Penetration Tester: Issue 2 – Anatomy of an Effective Penetration Test Report
    November 11, 2021
    Blog of a Penetration Tester: Article 2 – Unique Demands of the Role
    October 29, 2021
    Penetration Testing vs. Vulnerability Scanning
    October 5, 2021
    Blog of a Penetration Tester: Article 1 – Some Important Definitions
    September 28, 2021
    7 Reasons Why You Need Penetration Testing
    September 15, 2021
    5 Best Practices to Prevent Ransomware Attacks
    August 24, 2021
    Winmill Cyber Security Webinar
    July 7, 2021
    Application Penetration Testing for Compliance: The Nine Most Common Standards
    July 2, 2021

    DevOps

    What is Serverless?
    December 20, 2022
    Migrating Legacy Applications to the Cloud: Four Viable Approaches
    February 25, 2022
    Breaking Down a Serverless Architecture: The Back End
    December 28, 2021
    Breaking Down Serverless Architecture: The Middle Tier
    October 29, 2021
    Breaking Down Serverless Architecture: The Front End
    September 24, 2021
    The Benefits of a Serverless Architecture
    September 1, 2021
    DevOps vs. CloudOps
    July 5, 2021

    Software Development

    When is it Appropriate to Implement a Serverless Architecture?
    April 21, 2023
    IATSE Logo
    Home Depot Logo
    Federal Aviation Administration Logo
    Ernst and Young Corporate Logo
    Equifax Corporate Logo
    Dish Corporate Logo
    American Cancer Society Logo
    Volkswagen Logo
    Electronic Arts Corporate Logo
    Microsoft Logo
    Cisco Systems logo
    American Greetings Logo
    J.M. Smuckers Logo
    Kaiser Permanente Logo
    Columbia University Logo
    Yale University Logo
    UPS Logo
    Terumo Logo
    Sprint Logo
    Six Continents Logo
    SAIC Logo
    Radiant Logic Logo
    P.F. Chang's Logo
    Ohio State Logo
    Iona College Logo
    Harry Walker Logo
    Google Logo
    Duke Energy Logo
    Disney Logo
    Credit Suisee Logo
    Booz Allen Hamilton Logo
    BD Briggs Logo
    Asics Logo

    Interested in starting a project with us?

    Let's Talk