Adversary Simulations Blog by turingpoint

Blog posts about Adversary Simulations from our team.

FORCEDENTRY: iMessage zero-click Exploit in Check
FORCEDENTRY: iMessage zero-click Exploit in Check
New

An analysis of a Saudi Arabian activist's smartphone revealed that NSO Group used a zero-click exploit against iMessage.

More
What is NIST's Cybersecurity Framework?
What is NIST's Cybersecurity Framework?

A powerful tool, the Cybersecurity Framework helps NIST organize and improve your cybersecurity at the same time.

More
Security Awareness with a Phishing Simulation
Security Awareness with a Phishing Simulation

A phishing simulation is an often used tool to simulate or fake cyber attacks.

More
Informing about Ethical Hacking with Podcasts
Informing about Ethical Hacking with Podcasts

Here you can find out what ethical hacking is and which podcasts you can use to learn about it.

More
What makes a VPN Tunnel Secure?
What makes a VPN Tunnel Secure?

Surf the Internet without worries or minimise the risk of accessing distributed applications - thanks to VPN tunnels, you can surf the Internet safely.

More
Manage Access Data and Protect Sensitive Data with the Password Manager
Manage Access Data and Protect Sensitive Data with the Password Manager

With a password manager, users today can securely store and manage all their passwords.

More
What is Two-Factor Authentication? Is it Useful?
What is Two-Factor Authentication? Is it Useful?

Here you can find out what two-factor authentication is, what it looks like and why it is so important.

More