Author

Vaadata Author

Browsing

What is Red Teaming? Methodology and Scope of a Red Team Operation

With cyber attacks on the increase, the security of organisations is now a priority. And to respond effectively to this growing threat, Red Teaming is the strategy of choice.

This proactive approach fits in perfectly with regulatory frameworks such as ISO 27001 and the NIS 2 directive. These standards stress the importance of protecting sensitive data and ensuring rigorous information security management.

Subdomain Enumeration Techniques and Tools

Various subdomain enumeration techniques are used to identify the attack surface of a domain or organisation.
The aim is to obtain as complete a list as possible of all the subdomains associated with the targeted domain.

At Vaadata, we carry out this type of enumeration almost systematically during our audits. This is done as part of a global reconnaissance phase, in order to provide our clients with an overview of the subdomains and servers exposed.