Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giantsRecently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan... BLOG What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to... Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but... Privilege Escalation on Windows – Abusing Tokens October 16, 2018 What is Privilege Escalation? Operating Systems that manage a computer’s hardware and its resources are usually designed to be used by multiple users (accounts). Each of...
Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giantsRecently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan...
BLOG What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to... Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but... Privilege Escalation on Windows – Abusing Tokens October 16, 2018 What is Privilege Escalation? Operating Systems that manage a computer’s hardware and its resources are usually designed to be used by multiple users (accounts). Each of...
What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to...
Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have...
Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by...
Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but...
Privilege Escalation on Windows – Abusing Tokens October 16, 2018 What is Privilege Escalation? Operating Systems that manage a computer’s hardware and its resources are usually designed to be used by multiple users (accounts). Each of...