Blog
CITRIX WORKSPACE
This article describes the capabilities and architectural features of the Citrix Cloud platform and Citrix…
Broken Authentication Vulnerability
Network connection security has always been important. There are several session management methods, each with…
LIMEVPN HACKED – THOUSANDS FROM USERS’ DATA IS OUT AND SOLD
Another fast-paced maneuver started the day at Cyber World. LimeVPN, a VPN service, was recently…
Why Is Penetration Test Important To Your Business?
In today’s world, it is almost impossible to imagine a business without an Internet connection…
IS PENETRATION TESTING A MUST?
There are two types of companies in the world: those who know they’ve been hacked…
Wireless Network Penetration Test
Wireless networks are all around us everywhere, a network of millions of devices that are…
Penetration Testing, Red Teaming and CTFs
The need to assess the security of IT infrastructure arose almost simultaneously with computer systems.…
DNS SECURITY
Information security How to hide DNS requests from your ISP’s prying eyes Encrypting the traffic…
DDOS ATTACKS AND PROTECTION METHODS
Distributed denial-of-service attacks, or DDoS for short, have become commonplace and a major headache for…
XSS VULNERABILITY
Information Security The XSS vulnerability is a serious sort of vulnerability that can execute all…
NESSUS VULNERABILITY-SCANNER
Information Security Nessus is a tool that automates the scanning and detection of known vulnerabilities…
The Threat of Data Theft: Credential stuffing
The Threat of Data Theft: Credential stuffing When we talk about cyber attacks against companies,…
WHAT IS PENETRATION TEST?
What is Penetration Test? Penetration Testing (pen testing) are tests that allow you to check how…
WHAT ARE THE PENETRATION TESTING STANDARDS?
What are the penetration testing standards? An appropriate security framework should include ongoing security training…
WHAT IS RANSOMWARE?
Ransomware is a type of software that blocks or restricts users’ access to their systems,…