Archive for the ‘Pen Test’ Category

Network Penetration Testing: A Primer

What is Network Penetration Testing? A network penetration test, or pen test, is a method of assessing a network’s security and identifying vulnerabilities in the network by the intentional use of malicious penetration techniques. In simple terms, an ethical hacker tries to hack your organization’s network, with your permission, to reveal underlying security risks to […]

Leave a Comment

Amazon Web Services (AWS) Pentesting Resources

Leave a Comment

Fake Amazon gift card emails deliver the Dridex malware

The Dridex malware gang is delivering a nasty gift for the holidays using a spam campaign pretending to be Amazon Gift Cards. Dridex phishing campaign wants to send a gift When distributing malware, malware gangs commonly use current events and the holidays as themes for phishing campaigns to lure people into opening malicious attachments. Such […]

Leave a Comment

Black Hat USA Announces New Community Programs to Address the Needs of Information Security Professionals

Programs will address diversity and inclusion, mental health and career education. “The technical content that is presented on the Black Hat stage each year is an important contribution to the industry, but we’ve found that more sensitive topics such as mental health and diversity within the information security community are often not highlighted enough,” said […]

Leave a Comment

Why do organizations need to conduct a penetration test?

12 desirable reasons why an organization should carry out a penetration test:  Assess potential business and operational impacts of successful attacks and determine the feasibility of a particular set of attack vectors.  Identify higher-risk vulnerabilities resulting from lower-risk vulnerabilities exploited in a particular way. To comply with security regulations or standards, e.g. ISO 27001, NIST […]

Leave a Comment

Have you heard about the Pwn Phone 2014?

by Jamie Titchener If you have to undertake vulnerability scans or penetration tests at remote sites as part of your day-to-day activities, having to lug around a laptop and other scanning and penetration testing kit can be a real pain. Having the right tools for the job is crucial. But how can you ensure you […]

Leave a Comment

8 Best Books That Every Budding #Hacker Must Read

Everyone knows that a hacker by extension is always a programmer. What many don’t know though is that there is a lot more to it. It’s not just about knowing the language. A hacking is mainly defined by his curiosity to know what is otherwise not to be known. While the following books are on a […]

Leave a Comment


Penetration testing (often called “pen testing” or “security testing”) establishes whether or not the security in place to protect a network or application against external threats is adequate and functioning correctly. It is an essential component of most ISO27001 and UK public sector contracts. Why would my company need penetration testing services? In a world […]

Comments (1)