Precursor Security
CREST Certified Authors41 ArticlesFree Access

Security Best Practice
Library.

Free.

CVE advisories, incident response case studies, and hardening guides written by CREST-certified analysts. Covering penetration testing, SOC operations, M365 hardening, and threat intelligence.

Threat IntelligenceHow-To GuidesSOC & IRComplianceStrategic & CISO
Scroll
Featured
FeaturedReference

Cyber Security Glossary

The definitive reference for 40+ key cyber security terms, from penetration testing and red team operations to SIEM, MITRE ATT&CK, compliance frameworks, and threat intelligence. Written by CREST-certified experts.

20 min read·Quarterly Updated
Read article

Terms covered

Penetration TestingRed TeamMITRE ATT&CKZero-DaySOCCVSSMDRSIEMLateral MovementKill ChainXDRRansomware

Coverage

40+

Security terms defined

Threat Intelligence

Threat Intelligence

CVE advisories, active exploits, and attacker TTP analysis from the Precursor SOC.

5 articles
How-To Guides

How-To Guides

Technical hardening guides, configuration walkthroughs, and security checklists.

17 articles
Guide

A Guide to CREST Penetration Testing

What CREST accreditation means, certification levels (CPSA, CRT, CCT), when it is required, costs, and how to choose a CREST-accredited provider.

10 min
Read
Guide

Row-Level Recklessness: Testing Supabase Security

Common security pitfalls in Supabase apps, from MFA bypasses to misconfigured RLS policies, with practical testing guidance.

10 min·Joss Sparkes
Read
Guide

7 Steps to Secure Your Microsoft 365 Environment

Microsoft 365 handles business-critical operations for organisations of every size. Seven key steps to lock down your tenant effectively.

8 min
Read
Guide

Managing Exposure to Malicious Browser Extensions

51% of installed browser extensions are high risk. How Microsoft Defender XDR, Sentinel, and CrowdStrike can detect and contain them.

8 min
Read
Guide

Vulnerability Assessment vs Penetration Testing: What's the Difference?

A vulnerability assessment identifies known weaknesses at scale. A penetration test proves what an attacker can exploit. Most organisations need both.

9 min
Read
Guide

Internal vs External Penetration Testing: Which Does Your Organisation Need?

Internal pentesting simulates an attacker inside your network. External pentesting targets internet-facing assets. PCI DSS 4.0 requires both annually.

9 min
Read
Guide

Beginner's Guide to Vulnerability Triage

An actionable guide to triaging and prioritising vulnerabilities using CVSS, EPSS, CISA KEV catalog, and compensating controls.

9 min
Read
Guide

How to Secure Microsoft Office Desktop Deployments

Despite the push to cloud, Office desktop apps remain widely deployed. Technical guide to hardening Word, Excel, and PowerPoint.

7 min
Read
Guide

Vulnerability Remediation: Don't Forget Regression Testing

Why regression test coverage is essential after patching vulnerabilities, and how to build it into your remediation workflow.

5 min
Read
Guide

Vendor Onboarding Security: How to Vet New Suppliers

35.5% of breaches originate from third parties. A practical guide to tiered vendor risk assessment, the 10 security questions to ask every supplier, and contractual safeguards.

12 min
Read
Guide

API vs Web Application Penetration Testing: When You Need Both

The difference between API and web application penetration testing, what each covers, and why best practice is to test both together when a front end communicates with a backend API.

11 min
Read
Guide

OWASP Top 10: What a Penetration Tester Actually Looks For

How CREST penetration testers test each OWASP Top 10 2025 category. The scanner vs tester detection matrix, real testing techniques, and what the Top 10 misses.

14 min
Read
Guide

SQL Injection Explained: How Testers Find It and How Developers Prevent It

What SQL injection is, the types penetration testers look for, vulnerable vs secure code patterns, and why it remains in the top 3 findings in web application assessments.

12 min
Read
Guide

Cross-Site Scripting (XSS): Types, Examples, and How to Prevent It

Reflected, stored, and DOM-based XSS explained with real payload examples. How testers find XSS, why CSP alone is not enough, and the defence-in-depth prevention stack.

11 min
Read
Guide

WAF Bypass: Why a Web Application Firewall Alone Will Not Protect You

What a WAF blocks, what passes through (IDOR, business logic, JWT manipulation), and the encoding techniques attackers use to bypass WAF rulesets.

12 min
Read
Guide

Business Logic Vulnerabilities: What Automated Scanners Miss

IDOR, privilege escalation, payment manipulation, workflow bypass, and race conditions. The vulnerability classes that only manual penetration testing finds.

11 min
Read
Guide

SAST vs DAST vs Penetration Testing: Which Does Your Web Application Need?

The differences between SAST, DAST, SCA, and manual penetration testing. When to use each, what they find, and why the full stack matters at every maturity level.

13 min
Read
Strategic & CISO

Strategic & CISO

Board-level guidance, M&A cyber due diligence, and strategic security thinking for senior leaders.

7 articles
Common Questions

About the Intelligence Library

How often does Precursor Security publish new content?

New security advisories, CVE analysis, and threat intelligence pieces are published as events warrant, typically multiple times per month. Longer-form guides, incident response case studies, and CISO-level articles are published on an ongoing basis by our analyst team.

Are all guides and resources free to access?

Yes. Every article, guide, checklist, and template in this library is free to access without registration. Some resources (such as the Cyber Essentials Template Pack) include free downloadable assets available via our contact page.

Who writes Precursor Security's content?

Content is written by our CREST-certified security analysts, penetration testers, and SOC engineers. Technical research pieces include named authors. All content reflects live operational experience from active penetration testing and SOC engagements.

How do I receive new security advisories and articles?

Subscribe to our security newsletter via our contact page to receive CVE alerts and new article notifications. You can also follow Precursor Security on LinkedIn for real-time threat intelligence updates and new article announcements.

Published every Monday

Weekly Vulnerability
Roundup

Critical CVEs, security patches, active exploitation trends, and prioritised remediation guidance delivered every Monday morning by CREST-certified analysts. Free for security teams, IT managers, and CISOs.

CVE AnalysisPatch PrioritisationExploit IntelligenceZero extra cost

Subscribe, it's free

No spam. Unsubscribe any time. Covered by our Privacy Policy.

Already running

2+ years

See an example