Blog
Ideas and Insights from Pellera Technologies
Follow Us
Inside the Pellera Red Team Report: 2024 Penetration Testing Findings & 2025 Strategies
Red team penetration testing is vital for organizations looking to stay ahead of constant and evolving cybersecurity threats. Unlike reactive measures, red team testing offers a proactive approach to identifying and addressing vulnerabilities before attackers can...
Understanding IT Compliance: Why Compliance Doesn’t Equal Security
By: Duane Gran Cybersecurity and data protection/privacy are rightly viewed as the top priorities for 51% of global compliance leaders, according to PwC. However, one of the biggest misconceptions by enterprise executives at the C-suite and board level is that...
The Top 13 Cybersecurity Tools & Why They Alone Aren’t Enough
By: Anton Abaya The uncomfortable truth is that breaches rarely occur because organizations aren’t using the top cybersecurity tools. Even the most advanced artificial intelligence (AI) and cutting-edge security software in the world cannot compensate for a...
Scaling Hash Cracking Capabilities for Modern Demands
By: Reid Brosko Back in 2019, our team developed “McCracken,” an on-premises hash cracking rig. This project was born from necessity, curiosity, and the drive to give our Red Team a significant advantage in security engagements. At the time, we built the rig on a...
How to Build A Strong Data Protection Program for Your Business
By: Trisha Clark In our deeply connected world, a strong data protection program is no longer a luxury. It’s the very foundation of business resilience and customer trust. Building this foundation is a continuous journey. A future-built data protection program adapts...
Maximize Your ROI with Proactive Health Evaluations for IBM Guardium Data Protection
By: Trisha Clark In the world of enterprise data, protection isn’t just a feature, it’s the foundation of trust and momentum your organization strives toward to safeguard their sensitive information. The need for robust and proactive solutions is critical to achieve...
Physical Security Risks Exposed: Real-World Penetration Testing Lessons to Protect Your Business
By: Matt Millen Conversations about information security often focus on digital threats like ransomware, phishing campaigns, and zero-day exploits. While these risks are significant, they can overshadow a more fundamental vulnerability: physical access. If an...
How AI and App Code Open the Door to Attacks
By: Josh Berry It’s not news that artificial intelligence (AI) is driving innovation across industries. However, what is emerging, according to Pellera Technologies’ Global CISO Sean Colicchio, is that “AI is introducing whole new attack surfaces that weren’t even on...
Cloud Security Assessment: Identifying Where Hidden Risk Lives
By: Anton Abaya The cloud has become the backbone of modern business. It powers everything from collaboration tools to customer data platforms, fueling agility, scalability, and innovation. But for all its benefits, the cloud also comes with blind spots. Unlike...
Release McCracken! Building a Hash Cracking Rig
By: Reid Brosko *This post was originally published June 10, 2019. Throughout my career in a Red Team, there have been a couple of key assets that changed the game for myself and my teammates. Now, I am not talking about 0-days or exploits. I am referring to pieces of...