OffSec Releases Win-KeX 2.0 with Exciting New FeaturesWin-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... BLOG Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the...
OffSec Releases Win-KeX 2.0 with Exciting New FeaturesWin-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
BLOG Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the...
Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information...
FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have...
What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years...
Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by...
Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but...
Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the...