Penetration testing tools – What are the most common? By Alex Harper - January 26th, 2022 Posted in Penetration Testing cyber security, pen test, pen tester, pen testing, penetration testing, vulnerabilities, web proxy Penetration testing is a point-in-time security assessment, where a suitably skilled tester uses a combination of pen-testing tools and m...
Vulnerability scanning 101: Best Practices for Vulnerability Scanning By Alex Harper - November 10th, 2021 Posted in Information Security cyber attacks, cyber security, information security, patches, scanning, vulnerabilities, vulnerability scan Companies today face the ongoing task of securing complex information technology (“IT”) environments, while achieving their business obje...
OWASP Top 10 security vulnerabilities 2021 By Matt Gerry - October 27th, 2021 Posted in Information Security applications, OWASP, OWASP top 10, security, vulnerabilities, web applications, web apps OWASP is an acronym for the Open Web Application Security Project, a non-profit organisation that works to improve the security of web a...
Ethical hacking and penetration testing: what’s the difference? By Alex Harper - July 7th, 2021 Posted in Penetration Testing bug bounties, cyber security, ethical hacking, pen test, pen testing, penetration testing, vulnerabilities, vulnerability scans In 1998, the US-based hacker collective, L0pht Heavy Industries, found a way to shut down the Internet within 30 minutes. Rather than cau...