The need for vCISO services is growing. SMBs and SMEs are dealing with more third-party risks, tightening...
The notorious cybercrime group previously known as Hellokity has reemerged under a new alias, “HelloGookie.” This development...
We’re pleased to share that our External Attack Surface Management (EASM) solution is now available on AWS...
John the Ripper is a free password cracking software tool. Initially developed for the Unix operating system,...
With the end of 2014 dashing to a close and 2015 just over the hill, let’s take...
CeWL is a ruby app which spiders a given url to a specified depth, optionally following external...
Router Post-Exploitation Framework Currently, the framework includes a number of firmware image modules:‘Verified’ – This module is...
Last Friday, on my way home from 31c3, a funny thing happened on my way through Charles...
A bash script to automate the most basic usage of LUKS volumes in Linux. Like:Creating a virtual...
Would you like to know the process behind web scanning? What is Nikto Web Vulnerability Scanner? This...