Articles
-
Articles
Lessons Learned from the MGM Cyberattack
Read moreMay 02, 2024
-
Articles
Understanding the Missing HSTS Header Vulnerability
The missing HTTP Strict Transport Security (HSTS) header is a vulnerability that regularly pops up in our external penetration testing
Read moreApril 24, 2024
-
Articles
What is Physical Penetration Testing?
Read moreApril 12, 2024
-
Articles
What is Red Team Testing?
Red Team Testing is the more thorough simulated all-out attack on your organization.
Read moreApril 09, 2024
-
Articles
Cyber Attacks on Assisted Living Facilities
Nursing homes and assisted living businesses are being targeted by hackers
Read moreApril 04, 2024
-
Articles
XZ Utils CVE: How the Compromise Occurred
XZ Utils, a popular data compression software, was significantly compromised when versions 5.6.0 and 5.6.1 contained malicious code, posing a risk of unauthorized system access.
Read moreApril 02, 2024
-
Articles
How SOC 2 Reports Reveal Crucial Insights into Vendor Reliability
Understand the key elements of a SOC 2 report and how to interpret them effectively to evaluate vendor reliability.
Read moreMarch 29, 2024
-
Articles
What is a PCI DSS Penetration Test?
Electronic payments are subject to bad actors and hacks, and penetration tests can help you find vulnerabilities in advance.
Read moreMarch 27, 2024
-
Articles
What is a Wireless Assessment?
With a thorough review of authorizations, data, and configurations, you can be sure that your network will be inaccessible to any sort of bad actor.
Read moreMarch 14, 2024
-
Articles
What is Internal Penetration Testing?
Internal Penetration Testing is important to have for any business, which can show you the vulnerabilities and threats that you can fall victim to.
Read moreFebruary 16, 2024