Penetration Test Blog by turingpoint

Blog posts about Penetration Test from our team.

Advantages of Artificial Intelligence in IT Security
Advantages of Artificial Intelligence in IT Security
New

When it comes to cybercrime, the advantages of artificial intelligence cannot be denied. Many companies realize too late that they are the target of an attack.

More
Pentest: Which Components should be Considered First?
Pentest: Which Components should be Considered First?

For most applications, it makes sense to check the API interface first. Vulnerabilities of severity critical can arise here.

More
Does a Pentest have to be Done only Once?
Does a Pentest have to be Done only Once?

Companies often think that a single pentest before rolling out a system is sufficient. Why this assumption is a mistake?

More
What is an Ethical Hacker?
What is an Ethical Hacker?

Hackers have a bad reputation. They penetrate security systems, steal data and cause financial damage. But is that true?

More
Six Linux Distributions for Penetration Testing
Six Linux Distributions for Penetration Testing

For penetration tests, there are various Linux distributions that are precisely tailored for use in security analyses.

More
The Most Important Security Vulnerabilities in Web Applications: OWASP Top Ten
The Most Important Security Vulnerabilities in Web Applications: OWASP Top Ten

The OWASP TOP 10 provides companies with a simple overview of relevant security vulnerabilities of the year. It is produced each year by the Open Web Application Security Project.

More
Static Code Analysis: Identifying and Fixing Security Vulnerabilities in an Early Stage
Static Code Analysis: Identifying and Fixing Security Vulnerabilities in an Early Stage

Static code analysis can be used to examine source code for many vulnerabilities before it is compiled. How does it work?

More