Pentest statistics and most frequent vulnerabilities We do pentests every day. (Well, 5 days a week.) Today we’re taking you behind the scenes: we’ve got a closer look at the penetration tests performed ... 04.10 Applications
Phishing: how to prevent email spoofing? Used for phishing and other social engineering attacks, email spoofing is terribly tricky. Well executed, it’s difficult to detect and misleads the re... 21.09 Phishing & Social Engineering
2021 web, mobile, IoT cybersecurity statistics – Strengthen your security with a pentest From data breaches to malwares, cybersecurity is in the headlines almost every day and has become a major concern. Especially in the context of the he... 07.09 Applications
What security needs and what type of pentest for a startup? For many startups, cybersecurity and penetration testing in particular are issues that need to be addressed because of the requests of their customers... 20.08 Applications
Why testing insider threats during a pentest is important? Risks assessed during a pentest generally focus on attacks perpetrated from outside the information system. Indeed, a classic approach consists of fir... 01.07 Applications
SaaS application pentest: What are the main security challenges? Security is one of the main concerns of SaaS application publishers. Security is essential for users to trust the solution and to ensure tha... 29.06 Applications
How to Strengthen the Security of Your Mobile Applications to Counter the Most Common Attacks? Mobile applications are part of the elements to secure as they process personal data, access sensitive information, and in some cases enable remote co... 22.06 Applications
Security certifications: What can you require from pentest providers and what can you get after a pentest? CREST, OSCP, CEH… Should you require certifications from your pentest providers? To select a pentest provider, security certifications are obviously u... 03.06 Applications
Pentest or Bug Bounty: Which approach to choose for your security tests? ‘Bug bounty signs the end of pentests’ ‘Bug bounty, the death of the traditional penetration test’… Do you remember these article headlines? Today we ... 28.04 Applications
Are your Corporate Data and Sensitive Documents on the Dark Web? From a cybersecurity point of view, the dark web is like a huge marketplace where sensitive data (personal data, bank details, email addresses, creden... 12.04 Applications
Security of e-commerce websites: what are the priorities for a pentest? Regularly carrying out penetration tests on e-commerce websites ensures a good level of security. This is necessary to ensure the proper functioning o... 30.03 Applications
How to Strengthen the Security of Your Network Infrastructure to counter the Most Common Attacks? The network infrastructure is at the core of business operations in most industries. It can be considered the nerve centre of the entire IT organisati... 12.03 Infra & Network