Blogposts about cyber security in general, pentest, cloud security and red teaming from our team.
An HTTP reverse proxy can be used to improve phishing simulations by switching between the client and the target server.
Pharming means fraudulently obtaining information by manipulating DNS queries.
This article highlights the six criteria, defined by the BSI, that need to be considered in a pentest.
Recent advances, such as effective law enforcement efforts to combat ransomware, government policy changes, global sanctions and the impending regulation.
Threats from synthetic media such as represent a growing challenge for all users of modern technologies and communications.
The Silver Toolkit for Red Teaming Assessments is a toolkit designed to help security professionals around the world review their network protection.
Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment: