TLPT (Threat-Led Penetration Testing): Objective and Methodology In a context where cyberattacks are becoming more sophisticated, targeted and persistent, traditional security approaches are reaching their limits. I... 24.02 Applications
Social Engineering and Red Teaming: Understanding Threats and Defence Strategies Social engineering, especially phishing in all its forms (emails, text messages, phone calls, QR codes, etc.), remains one of the main attack vectors.... 07.01 Phishing & Social Engineering
Phishing Campaign: Objectives, Methodology, Spear and Mass Phishing Examples Phishing remains one of the most formidable and widely used techniques in cyber attacks. Exploiting human weakness, this method consists of tricking v... 21.02 Phishing & Social Engineering
Assumed Breach: Objectives, Methodology, Test Scenarios and Use Cases At a time when cyber attacks are increasing in frequency, sophistication and impact, traditional defensive approaches, while necessary, are no longer ... 30.12 Applications
What is Red Teaming? Methodology and Scope of a Red Team Operation With cyber attacks on the increase, the security of organisations is now a priority. And to respond effectively to this growing threat, Red Teaming is... 30.12 Applications
Security Audits: Objectives, Types and Methodologies With cyberattacks on the rise, carrying out an IT security audit has never been a higher priority for businesses. Web applications, mobile apps, APIs,... 06.08 Applications
Phishing: Methodology, Common Techniques and Tools We can’t talk about social engineering without mentioning phishing. Similarly, email is essential when it comes to phishing. Although there are ... 05.08 Phishing & Social Engineering
Smishing (SMS Phishing): How to Identify Attacks and Protect Yourself? What is Smishing? You will no doubt be familiar with phishing, which consists of sending malicious emails to encourage people to perform sensitive act... 05.02 Phishing & Social Engineering
Penetration Testing: Methodology, Scope and Types of Pentests With cybersecurity risks on the rise, it is becoming more and more obvious to carry out a penetration test (pentest) to reassure customers, partners a... 05.02 Applications
How to increase risk awareness to prevent social engineering attacks? Over the years, social engineering attacks have become a reality for all companies, regardless of their sector of activity or size. Beyond the technic... 06.05 Phishing & Social Engineering