It has been estimated that at least 50% of enterprises will be implementing GraphQL in their production environments by the end of the calendar year. Recently, Security Engineer Aleksa Zatezalo discovered an attack vector that allowed full administrative privileges. Learn more about this vulnerability and the steps you can take to remediate it here: https://ow.ly/N30c50SKX4F
Praetorian
Computer and Network Security
Austin, TX 11,359 followers
The Leader in Offensive Security
About us
Praetorian, a trusted leader in offensive security services, empowers enterprises to thrive in a digital world without compromise. Enterprise security demands the ability to proactively detect vulnerabilities and threats, yet identifying signals from noise in today’s ever-expanding attack surfaces is increasingly difficult. Our cybersecurity experts provide the deep subject matter expertise needed to defend against persistent, sophisticated attacks. Praetorian professional and managed services cover all attack vectors - external, internal, cloud, web app, secrets, phishing, and supply chain and vendor risk. With Praetorian standing guard, CISOs of the world’s largest organizations rest assured that they can accelerate digital growth without compromise.
- Website
-
https://www.praetorian.com
External link for Praetorian
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Austin, TX
- Type
- Privately Held
- Founded
- 2010
- Specialties
- IoT Security, ICS Security, Cloud Security, Web Security, Mobile Security, Network Security, Application Security, Penetration Testing, Security Assessments, Red Team, Corporate Security, Product Security, Security Testing, Software Assurance, Machine Learning, Purple Team, DevSecOps, Incident Response, Attack Surface Management, and AI Security
Locations
-
Primary
Austin, TX 78701, US
Employees at Praetorian
Updates
-
Praetorian's own Justin Copeland, Director of Product Marketing, sat down with Programming Insider to discuss the need for organizations to embrace a continuous approach to their cybersecurity practices. Read the full article here: https://ow.ly/bs2150SIK0Y
-
During a recent engagement testing an up-and-coming SaaS data platform, Security Engineers Ben Kofman and Ryan Grunsten discovered an alarming attack path. Read their latest blog to learn more! https://ow.ly/2cKL50SJw3w
Recursive Amplification Attacks: Botnet-as-a-Service | Praetorian
praetorian.com
-
David Hunt, CTO at Praetorian recently spoke with CT Post about the local CrowdStrike outage and what organizations can do to prevent disruption in the future. https://ow.ly/PsQG50SIJFY
-
Praetorian reposted this
Going to Black Hat USA 2024? I’m excited to be speaking at the first-ever Software Supply Chain Security Summit in a few weeks! Join other top security executives and Praetorian at the first-ever Software Supply Chain Security Summit, hosted by Lineaje Inc! Curated for CISOs, CPOs, CTOs, CIOs, DevSecOps, DevOps, and other senior-level security professionals, it will be a day filled with insights and collaboration in a lounge-like setting. Come hear my session with security leaders on “How to Build Secure Software” at this exclusive event. Full agenda and registration: https://lnkd.in/egmB4PbK
-
Unconstrained delegation is a feature in Active Directory that allows a computer, service, or user to impersonate any other user and access resources on their behalf across the entire network, completely unrestricted. Read our latest blog here: https://ow.ly/AXoh50SFBZ6
Unconstrained Delegation in Active Directory | Praetorian
https://www.praetorian.com
-
We have recently identified several vulnerable HTTP requests that allow attackers to capture access keys and session tokens for a web application’s AWS infrastructure. Attackers could use these keys and tokens to access back-end IOT endpoints and CloudWatch instances to execute commands. Read our latest blog here: https://ow.ly/Ha8R50SFBPG
Capturing Exposed AWS Keys During Dynamic Web Application Tests | Praetorian
https://www.praetorian.com
-
Misconfigurations in public cloud platforms often have devastating security implications. Ensure your Google Cloud assets are properly secured and configured. Sign up for your free Chariot Attack Surface Management account today: https://ow.ly/rrwQ50Sy5Kt #GoogleCloud #CloudSecurity #AttackSurfaceManagement
Continuous Threat Exposure Management for Google Cloud | Praetorian
https://www.praetorian.com
-
Check out our latest blog post, Unity Across Continents: Building Culture in a Remote Startup, by Michelle Rhodes. Discover how Praetorian fosters a cohesive company culture and embraces diversity across 11 (soon to be 12!) countries. Every voice matters, and every perspective is valued in our mission to make the world a safer place. Read more here: https://lnkd.in/ghM5wSMs #Praetorian #CompanyCulture #Diversity #Innovation #GlobalTeam
Unity Across Continents: Building Culture in a Remote Startup | Praetorian
https://www.praetorian.com
-
Are your GitHub repositories secure? Find out now. ✅ Exposed secrets in the source code? ✅ CI/CD Misconfigurations? ✅ Private Repositories recently turned public? Sign up for your free ASM scan and find out today! Learn more: https://lnkd.in/gm58VDhC #GitHubSecurity #AttackSurfaceManagement
Secrets Exposed: The Rise of GitHub as an Attack Vector | Praetorian
https://www.praetorian.com