Transform Your Vulnerability Management Program. Together.

We are committed to helping enterprises take a more proactive, efficient, and effective approach to software vulnerability management. By providing our customers with unprecedented visibility into software behavior, we can enable them to dramatically increase them maximize their risk reduction and increase their return on their vulnerability management investment.

Resources

Beyond LOLBAS: The Hidden Dangers of Third-Party Software

Attackers increasingly prefer to leverage legitimate software already present in target environments rather than introducing malicious executables.

Josh Skorich by Josh Skorich

Using Runtime Monitoring to Detect the Hidden Threat of Remotely Accessible Named Pipes

At Spektion, our continuous monitoring of software behavior across thousands of products in enterprise environments has revealed a concerning pattern: remotely accessible Named Pipes are far more prevalent than most security teams realize.

Josh Skorich by Josh Skorich

Spektion Emerges from Stealth with Advanced Vulnerability Management Solution and $5 Million in Seed Funding

Breaking the Cycle of Ineffective Vulnerability Management with its Purpose-Built Solution Harnessing Runtime Insights

Casie Abello by Casie Abello

Risk of Tampering with macOS TCC, When Consent Isn't Really Consent

On the heels of releasing the macOS sensor earlier this week, its as good a time as ever to dig into some mac specific risks. Having spent the majority of my career attacking Windows its fun to peak under the macOS hood.

Josh Skorich by Josh Skorich

The risk of allocating executable memory pages in external processes

One of the more common risks I still see in commercial software is applications that dynamically allocate memory in external processes—for instance, by creating memory pages with both writable and executable permissions.

Josh Skorich by Josh Skorich