Precursor Security
CREST Certified Authors32 ArticlesFree Access

Security Best Practice
Library.

Free.

CVE advisories, incident response case studies, and hardening guides written by CREST-certified analysts. Covering penetration testing, SOC operations, M365 hardening, and threat intelligence.

Threat IntelligenceHow-To GuidesSOC & IRComplianceStrategic & CISO
Scroll
Featured
FeaturedReference

Cyber Security Glossary

The definitive reference for 40+ key cyber security terms, from penetration testing and red team operations to SIEM, MITRE ATT&CK, compliance frameworks, and threat intelligence. Written by CREST-certified experts.

20 min read·Quarterly Updated
Read article

Terms covered

Penetration TestingRed TeamMITRE ATT&CKZero-DaySOCCVSSMDRSIEMLateral MovementKill ChainXDRRansomware

Coverage

40+

Security terms defined

Threat Intelligence

Threat Intelligence

CVE advisories, active exploits, and attacker TTP analysis from the Precursor SOC.

5 articles
How-To Guides

How-To Guides

Technical hardening guides, configuration walkthroughs, and security checklists.

10 articles
Guide

A Guide to CREST Penetration Testing

What CREST accreditation means, certification levels (CPSA, CRT, CCT), when it is required, costs, and how to choose a CREST-accredited provider.

10 min
Read
Guide

Row-Level Recklessness: Testing Supabase Security

Common security pitfalls in Supabase apps, from MFA bypasses to misconfigured RLS policies, with practical testing guidance.

10 min·Joss Sparkes
Read
Guide

7 Steps to Secure Your Microsoft 365 Environment

Microsoft 365 handles business-critical operations for organisations of every size. Seven key steps to lock down your tenant effectively.

8 min
Read
Guide

Managing Exposure to Malicious Browser Extensions

51% of installed browser extensions are high risk. How Microsoft Defender XDR, Sentinel, and CrowdStrike can detect and contain them.

8 min
Read
Guide

Vulnerability Assessment vs Penetration Testing: What's the Difference?

A vulnerability assessment identifies known weaknesses at scale. A penetration test proves what an attacker can exploit. Most organisations need both.

9 min
Read
Guide

Internal vs External Penetration Testing: Which Does Your Organisation Need?

Internal pentesting simulates an attacker inside your network. External pentesting targets internet-facing assets. PCI DSS 4.0 requires both annually.

9 min
Read
Guide

Beginner's Guide to Vulnerability Triage

An actionable guide to triaging and prioritising vulnerabilities using CVSS, EPSS, CISA KEV catalog, and compensating controls.

9 min
Read
Guide

How to Secure Microsoft Office Desktop Deployments

Despite the push to cloud, Office desktop apps remain widely deployed. Technical guide to hardening Word, Excel, and PowerPoint.

7 min
Read
Guide

Vulnerability Remediation: Don't Forget Regression Testing

Why regression test coverage is essential after patching vulnerabilities, and how to build it into your remediation workflow.

5 min
Read
Guide

Vendor Onboarding Security: How to Vet New Suppliers

35.5% of breaches originate from third parties. A practical guide to tiered vendor risk assessment, the 10 security questions to ask every supplier, and contractual safeguards.

12 min
Read
Strategic & CISO

Strategic & CISO

Board-level guidance, M&A cyber due diligence, and strategic security thinking for senior leaders.

7 articles
Common Questions

About the Intelligence Library

How often does Precursor Security publish new content?

New security advisories, CVE analysis, and threat intelligence pieces are published as events warrant, typically multiple times per month. Longer-form guides, incident response case studies, and CISO-level articles are published on an ongoing basis by our analyst team.

Are all guides and resources free to access?

Yes. Every article, guide, checklist, and template in this library is free to access without registration. Some resources (such as the Cyber Essentials Template Pack) include free downloadable assets available via our contact page.

Who writes Precursor Security's content?

Content is written by our CREST-certified security analysts, penetration testers, and SOC engineers. Technical research pieces include named authors. All content reflects live operational experience from active penetration testing and SOC engagements.

How do I receive new security advisories and articles?

Subscribe to our security newsletter via our contact page to receive CVE alerts and new article notifications. You can also follow Precursor Security on LinkedIn for real-time threat intelligence updates and new article announcements.

Published every Monday

Weekly Vulnerability
Roundup

Critical CVEs, security patches, active exploitation trends, and prioritised remediation guidance delivered every Monday morning by CREST-certified analysts. Free for security teams, IT managers, and CISOs.

CVE AnalysisPatch PrioritisationExploit IntelligenceZero extra cost

Subscribe, it's free

No spam. Unsubscribe any time. Covered by our Privacy Policy.

Already running

2+ years

See an example