SPARK42 | Offensive Security Blog
  • SPARK42
  • SERVICES
  • CONTACT
  • BLOG
Realistic Lab for Red Team CCRTS Exam Preparation
Red Teaming

Realistic Lab for Red Team CCRTS Exam Preparation

Prepare for the CREST CCRTS exam with CCRTS-Lab, a modular AWS red-team environment that deploys in under 10 minutes. Built with Terraform and Ansible, it includes Kali, Windows, AD, and ELK logging. Explore the full guide with diagrams and setup steps.
Read More
Richard Mader
SPARK42 joins the CREST Accreditation Pathway
Milestones

SPARK42 joins the CREST Accreditation Pathway

SPARK42 has joined the CREST Accreditation Pathway, a milestone on our journey to full accreditation. This reflects our commitment to recognized standards in penetration testing and to delivering trusted, high-quality cyber security services.
Read More
Richard Mader
From ISO to DORA: Who Wants You to Hack Yourself—and How Often
Red Teaming

From ISO to DORA: Who Wants You to Hack Yourself—and How Often

Pen tests and red teaming aren’t just best practices—they’re regulatory requirements. This guide breaks down ISO, PCI DSS, DORA, NIS2, and more in one clear table so you know exactly what’s mandatory.
Read More
Richard Mader
Penetration Testing vs. Red Teaming: What’s Right for Your Organization?
Red Teaming

Penetration Testing vs. Red Teaming: What’s Right for Your Organization?

This blogpost explains the differences, benefits, and when each is the right choice to strengthen your organization’s security and resilience.
Read More
Richard Mader
Top 10 Open-Source AI Agent Penetration Testing Projects
PenetrationTesting

Top 10 Open-Source AI Agent Penetration Testing Projects

Explore top open-source AI tools for penetration testing, from mature frameworks like CAI and Nebula to flexible assistants like HackingBuddyGPT. Compare features like self-hosted LLMs, automation, and real-world usability to find the right fit for your security workflows.
Read More
Richard Mader
The WPA2 Reality Check: Common Attacks and Modern Defenses
WI-FI Hacking

The WPA2 Reality Check: Common Attacks and Modern Defenses

Still using WPA2 Wi-Fi? So are 70% of networks — and attackers know it. Learn how they crack it in minutes and how you can shut them down fast.
Read More
Marián Čupka
Generative AI in Penetration Testing: Exploring Tools and Anonymization Challenges
PenetrationTesting

Generative AI in Penetration Testing: Exploring Tools and Anonymization Challenges

Generative AI is revolutionizing penetration testing with automation, scripting, and reporting. This research explores AI-driven pentesting tools and anonymization challenges.
Read More
Richard Mader
Breaking the Chains: Two Ways to Escape a Docker Container
Exploit

Breaking the Chains: Two Ways to Escape a Docker Container

Docker containers offer isolation, but misconfigurations can lead to escapes. Learn how attackers exploit the Docker socket and cgroups to break out.
Read More
Jan Michálek
How Web Page Penetration Testing Shields Your Business from Cyber Threats
PenetrationTesting

How Web Page Penetration Testing Shields Your Business from Cyber Threats

Protect your website from cyber threats with Spark 42! We simulate real-world attacks, uncover vulnerabilities, and provide expert remediation. Stay secure!
Read More
Marián Čupka
When Ransomware Targets Critical Systems: Lessons from the Frontlines
Ransomware

When Ransomware Targets Critical Systems: Lessons from the Frontlines

The recent ransomware attack on the Slovak Land Registry reveals the risks to critical systems, turning backups into liabilities and disrupting operations. This blog explores recovery challenges and highlights the role of proactive vulnerability assessment in mitigating future threats.
Read More
Richard Mader Marián Čupka
Red-teaming training platforms review 2024
Red Teaming

Red-teaming training platforms review 2024

highlights top choices for those seeking practical skills, industry recognition, and a pathway into professional red team roles
Read More
Richard Mader
Effective corporate vulnerability management
Vulnerability

Effective corporate vulnerability management

Revived a state-of-the-art vulnerability management program at a large enterprise—an experience full of surprises and hard lessons. Three key processes made all the difference.
Read More
Richard Mader
SPARK42 | Offensive Security Blog © 2025
  • Sign up
Powered by Ghost