Careers in Penetration Testing: A Deep Dive into the Trenches As the digital realm grows, so does the spectrum of threats shadowing it. Penetration testers, the guardians of this virtual world, stand at the forefront, ensuring security isn't merely a buzzword but a reality. Read More
Top Penetration Testing Certifications to Boost Your Cybersecurity Career If you're considering a career in penetration testing, the right certification can give you the required skills and credibility. In this article we examine some of the best penetration testing certifications currently available. Read More
When is it Appropriate to Implement a Serverless Architecture? Developers should carefully consider the trade-offs of serverless architectures before locking themselves into a design that may have ramifications for years to come. Read More
Enhancing SOC Assessments with MITRE ATT&CK Enhancing SOC Assessments with MITRE ATT&CK: A Game Changer for Cybersecurity. Discover how the MITRE ATT&CK framework can significantly improve the effectiveness of your Security Operations Center (SOC) assessments. Read More
The Social Engineer’s Toolkit (SET) In this article, we discuss the Social Engineer's Toolkit (SET). Read More
Kali Purple: A First Look at Kali Linux for Blue and Purple Teams In this article, we share a first look at Kali Linux for Blue and Purple teams Read More
Beyond alert(“XSS”): Advanced Client-Side Penetration Testing with the Browser Exploitation Framework In this article, we will take a closer look at BeEF and explore how it works, its features, and how it can be used in penetration testing. Read More
Pen Tester’s Notebook – Part 1 – Formatting Nmap Results In this series, we share professional pen testing tips to help you elevate your ethical hacking skills to the next level. You will learn how professional penetration testers solve some of the most common hurdles encountered during the various phases of real-life ethical hacking engagements. Read More
Application Scan Identifies an SSRF Vulnerability; Penetration Test Finds Exploitation Attack Vectors In this demonstration we leverage a Server-Side Request Forgery (SSRF) vulnerability, and then abuse the privileges of two users to access the root system of the server. Read More