Pentest statistics and most frequent vulnerabilities We do pentests every day. (Well, 5 days a week.) Today we’re taking you behind the scenes: we’ve got a closer look at the penetration tests performed ... 04.10 Applications
Phishing: how to prevent email spoofing? Used for phishing and other social engineering attacks, email spoofing is terribly tricky. Well executed, it’s difficult to detect and misleads the re... 21.09 Phishing & Social Engineering
What security needs and what type of pentest for a startup? For many startups, cybersecurity and penetration testing in particular are issues that need to be addressed because of the requests of their customers... 20.08 Applications
Why testing insider threats during a pentest is important? Risks assessed during a pentest generally focus on attacks perpetrated from outside the information system. Indeed, a classic approach consists of fir... 01.07 Applications
Security certifications: What can you require from pentest providers and what can you get after a pentest? CREST, OSCP, CEH… Should you require certifications from your pentest providers? To select a pentest provider, security certifications are obviously u... 03.06 Applications
Pentest or Bug Bounty: Which approach to choose for your security tests? ‘Bug bounty signs the end of pentests’ ‘Bug bounty, the death of the traditional penetration test’… Do you remember these article headlines? Today we ... 28.04 Applications
Are your Corporate Data and Sensitive Documents on the Dark Web? From a cybersecurity point of view, the dark web is like a huge marketplace where sensitive data (personal data, bank details, email addresses, creden... 12.04 Applications
Phishing Analysis: 8 Psychological Drivers Do you know why phishing is so dangerous? Because it combines IT skills with knowledge of human psychology. In fact, a phishing email relies on human ... 08.10 Phishing & Social Engineering
How To Define The Scope Of A Pentest? Defining the scope of a penetration test is a delicate step. What will be the target of the pentest? More precisely, which functional and technical as... 17.09 Applications
When is the right time to perform a pentest? Performing a pentest can be part of your objectives, without it being the priority of the moment. This for various reasons: developments are in progre... 07.07 Applications
Penetration Testing: Approach, Methodology, Types of Tests and Rates Cybersecurity Issues for Businesses in 2020 The current trend is to strengthen the security requirements for customers, partners and investors. Securi... 12.05 Applications
Understanding USB Attacks USB devices are so convenient. Whenever we need to store small amounts of data, we use a USB stick. Everyone owns one and we generally trust it to be ... 09.05 Phishing & Social Engineering