Blogposts about cyber security in general, pentest, cloud security and red teaming from our team.
An HTTP reverse proxy can be used to improve phishing simulations by switching between the client and the target server.
This article highlights the six criteria, defined by the BSI, that need to be considered in a pentest.
Pentests can be carried out by an analyst on site or remotely. This article is intended to explain the advantages and disadvantages of the 2 options.
Recent advances, such as effective law enforcement efforts to combat ransomware, government policy changes, global sanctions and the impending regulation.
However, a compromised digital application can lead to reputational damage by inadvertently exposing the user's digital life.
On November 1, 2023, the Common Vulnerability Scoring System Version 4 (CVSS v4) was officially introduced as an update for version v3.1.
Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment: