Red Teaming Blog by turingpoint

Blog posts about Red Teaming from our team.

FORCEDENTRY: iMessage zero-click Exploit in Check
FORCEDENTRY: iMessage zero-click Exploit in Check
New

An analysis of a Saudi Arabian activist's smartphone revealed that NSO Group used a zero-click exploit against iMessage.

More
What is NIST's Cybersecurity Framework?
What is NIST's Cybersecurity Framework?

A powerful tool, the Cybersecurity Framework helps NIST organize and improve your cybersecurity at the same time.

More
Security Awareness with a Phishing Simulation
Security Awareness with a Phishing Simulation

A phishing simulation is an often used tool to simulate or fake cyber attacks.

More
Effectively Test for Brute Force Attacks: Reasons, Methods and Tools for more Security on the Internet
Effectively Test for Brute Force Attacks: Reasons, Methods and Tools for more Security on the Internet

The principle of brute force attacks: An attacker gains access to a system by systematically trying passwords.

More
Understanding & Preventing Social Engineering: Five Books to Protect Corporate Data
Understanding & Preventing Social Engineering: Five Books to Protect Corporate Data

How third parties gain unauthorized access to systems by targeting employees to manipulate them into revealing information.

More
Informing about Ethical Hacking with Podcasts
Informing about Ethical Hacking with Podcasts

Here you can find out what ethical hacking is and which podcasts you can use to learn about it.

More
Ransomware Emergency: These Tips will help you
Ransomware Emergency: These Tips will help you

Once there is a suspicion of ransomware, it is usually already too late. Therefore, we inform you how to act in such a situation.

More