Search Results for: penetration Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done... Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered... Knowledge Center Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?... Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... Blog Post Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan... Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Blog Post Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but... Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... Blog Post Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... Blog Post Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and...
Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done...
Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Knowledge Center Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?...
Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
Blog Post Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Blog Post Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but...
Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Blog Post Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
Blog Post Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and...