Infrastructure Penetration Test Blog by turingpoint

Blog posts about Infrastructure Penetration Test from our team.

What is NIST's Cybersecurity Framework?
What is NIST's Cybersecurity Framework?
New

A powerful tool, the Cybersecurity Framework helps NIST organize and improve your cybersecurity at the same time.

More
Pinning of Certificates and Public Keys
Pinning of Certificates and Public Keys

Public key pinning allows you to specify your public key set for a future SSL/TLS connection to your host.

More
CIS Benchmark - for Highest Cloud Security
CIS Benchmark - for Highest Cloud Security

CIS Benchmarks are among the best practices you can use to configure a target system securely.

More
Penetration Testing for SMEs - Security for Small and Nedium-sized Enterprises
Penetration Testing for SMEs - Security for Small and Nedium-sized Enterprises

This made the penetration test a useful tool for SMEs: It detects exposed vulnerabilities and helps to increase internal security.

More
PrintNightmare Vulnerability in Windows
PrintNightmare Vulnerability in Windows

PrintNightmare allows malicious code from attackers to infiltrate the Microsoft system and exploit the vulnerability using privilege sets.

More
Pentest: Which Components should be Considered First?
Pentest: Which Components should be Considered First?

For most applications, it makes sense to check the API interface first. Vulnerabilities of severity critical can arise here.

More
Does a Pentest have to be Done only Once?
Does a Pentest have to be Done only Once?

Companies often think that a single pentest before rolling out a system is sufficient. Why this assumption is a mistake?

More