Red Teaming Blog by turingpoint

Blog posts about Red Teaming from our team.

Log4j - Critical Zero-Day Vulnerability in Logging Library
Log4j - Critical Zero-Day Vulnerability in Logging Library
New

The Log4Shell zero-day vulnerability is considered highly security-critical. It allows attackers to execute arbitrary code.

More
What does the Coalition Agreement say about Cyber Security and Digital Civil Rights?
What does the Coalition Agreement say about Cyber Security and Digital Civil Rights?

The new coalition agreement aims to strengthen the law on the Internet and advance society in terms of cyber security.

More
Error culture in the IT department - How an open Approach to Errors Promotes the Security Level of Companies
Error culture in the IT department - How an open Approach to Errors Promotes the Security Level of Companies

The reasons for penetration testing are numerous and yet, from a legal perspective, they are often in a gray area.

More
FORCEDENTRY: iMessage zero-click Exploit in Check
FORCEDENTRY: iMessage zero-click Exploit in Check

An analysis of a Saudi Arabian activist's smartphone revealed that NSO Group used a zero-click exploit against iMessage.

More
What is NIST's Cybersecurity Framework?
What is NIST's Cybersecurity Framework?

A powerful tool, the Cybersecurity Framework helps NIST organize and improve your cybersecurity at the same time.

More
Security Awareness with a Phishing Simulation
Security Awareness with a Phishing Simulation

A phishing simulation is an often used tool to simulate or fake cyber attacks.

More
Effectively Test for Brute Force Attacks: Reasons, Methods and Tools for more Security on the Internet
Effectively Test for Brute Force Attacks: Reasons, Methods and Tools for more Security on the Internet

The principle of brute force attacks: An attacker gains access to a system by systematically trying passwords.

More