Blog English

Security Misconfiguration

Security Misconfiguration ranks sixth in the OWASP TOP 10 as it remains prevalent in projects and is susceptible to around 42% of companies according to statistics. Securing a Web application requires a secure configuration of all infrastructure components. Application components (such as frameworks) are the web server, database server, and the platform itself. The default

Security Misconfiguration Read More »

Penetration Test Tools Part 2

Penetration testing goes beyond vulnerability scanning to use multi-step and multi-factor attack scenarios that first find vulnerabilities and then attempt to exploit them to dig deeper into the enterprise infrastructure. 11) Metaspoilt It is one of the most popular and advanced frameworks that can be used for Penetration Testing. It is an open source tool

Penetration Test Tools Part 2 Read More »

What is EDR?

EDR (Endpoint Detection and Response) is a class of solutions for detecting and investigating malicious activity. Unlike antiviruses, whose task is to combat typical and major threats, EDR solutions focus on identifying targeted attacks and complex threats. EDR Architecture In general, the Endpoint Detection & Response class system consists of agents installed on endpoints and

What is EDR? Read More »

NDR (Network Detection Response)

Network Detection and Response systems (NDR – Network Detection Response) allows you to probe your network and Cloud Traffic deeply to detect and respond to malicious activity. Cyber ​​attackers often use multiple tactics to evade security tools, but in doing so they create even more opportunities for analysts to find them. Network Detection and Response

NDR (Network Detection Response) Read More »

Penetration Test Tools Part 1

Penetration Testing tools help identify security weaknesses in a network, server, or web application. These tools are very useful as they allow you to identify “unknown vulnerabilities” in software and network applications that could cause a security breach. Vulnerability Assessment and Penetration Testing Tools attack your system inside and outside the network as if a

Penetration Test Tools Part 1 Read More »