Adversary Simulations Blog by turingpoint

Blog posts about Adversary Simulations from our team.

Log4j - Critical Zero-Day Vulnerability in Logging Library
Log4j - Critical Zero-Day Vulnerability in Logging Library
New

The Log4Shell zero-day vulnerability is considered highly security-critical. It allows attackers to execute arbitrary code.

More
What does the Coalition Agreement say about Cyber Security and Digital Civil Rights?
What does the Coalition Agreement say about Cyber Security and Digital Civil Rights?

The new coalition agreement aims to strengthen the law on the Internet and advance society in terms of cyber security.

More
Error culture in the IT department - How an open Approach to Errors Promotes the Security Level of Companies
Error culture in the IT department - How an open Approach to Errors Promotes the Security Level of Companies

The reasons for penetration testing are numerous and yet, from a legal perspective, they are often in a gray area.

More
FORCEDENTRY: iMessage zero-click Exploit in Check
FORCEDENTRY: iMessage zero-click Exploit in Check

An analysis of a Saudi Arabian activist's smartphone revealed that NSO Group used a zero-click exploit against iMessage.

More
What is NIST's Cybersecurity Framework?
What is NIST's Cybersecurity Framework?

A powerful tool, the Cybersecurity Framework helps NIST organize and improve your cybersecurity at the same time.

More
Security Awareness with a Phishing Simulation
Security Awareness with a Phishing Simulation

A phishing simulation is an often used tool to simulate or fake cyber attacks.

More
Informing about Ethical Hacking with Podcasts
Informing about Ethical Hacking with Podcasts

Here you can find out what ethical hacking is and which podcasts you can use to learn about it.

More