penetration testing

How Companies Can Mitigate Supply-Chain Attacks?

The supply chain attack that is becoming a problem today refers mainly to the method of embedding malware and backdoor in the product itself, update programs, patch modules, etc., in light of the vulnerability of the software product supply chain. A legitimate software developer will not deliberately insert those features to the products they offer

[ Read More ]

Penetration Testing Tool Yuki-Chan for Threat Protection

We are recommending for quite a while for companies serious with their IT security to subject itself to a thorough penetration testing. Pen test can be done internally by knowledgeable IT staff, or the company can hire an external pen testing team. Members of pen test teams are passionable when it comes to detecting weaknesses

[ Read More ]

Mimikatz: A Deeper Look At Blackhat And Whitehat Hackers’ Shared Tool

There is a thin line that separates black hat hackers (malicious hackers) and white hat hackers (ethical hackers), both possess skills that can harm networks, systems, and computers if they wish to do so. The good thing is ethical hackers helps lessen the chances that blackhat hackers become successful with their campaigns. They do this

[ Read More ]

CISO’s Role For Cybersecurity Readiness, Highlighted By Cisco

We are in the paradigm shift when the majority of companies, slowly but surely embracing cloud computing and cloud apps platforms. Cisco’s CISO Benchmark Study 2019 is a global survey participated and represented by 18 countries with 3,200 participants, majority of whom are leaders in the IT field, across many industries from SMEs to multinational

[ Read More ]