Archive for the ‘Pen Test’ Category

Reconnaissance for Bug Bounty Hunters & Pentesters

New to the bug bounty and confused about where to start? Worry not! This reconnaissance for bug bounty hunters guides you to take the first step in bug bounty hunting. Reconnaissance is the initial step in every penetration test, bug bounty, or ethical hacking. This step aims to gather the target’s information publicly available on […]

Leave a Comment

FIN7 cybercrime gang creates fake cybersecurity firm to recruit pentesters for ransomware attacks

The FIN7 hacking group is attempting to enter in the ransomware business and is doing it with an interesting technique. The gang space creates fake cybersecurity companies that hire experts requesting them to carry out pen testing attacks under the guise of pentesting activities. FIN7 is a Russian criminal group that has been active since mid-2015, it focuses on restaurants, […]

Leave a Comment

PenTest as a Service

Download Modern Pentesting for security and development team Find out how Cobalt service protect your Apps: Cobalt’s Pentest as a Service (PtaaS) platform coupled with an exclusive community of testers delivers the real-time insights you need to remediate risk quickly and innovate securely. Please email with the subject “Beginner’s Guide to Compliance-Driven Pentesting” if interested […]

Leave a Comment

Getting cyber secure with penetration testing

To achieve real cybersecurity, business leaders must implement the right solutions to protect their assets from cyber threats. Checkout Cobalt PenTest as a Service to find out how to keep your organization secure from a cyber attack with effective penetration testing, and discover: Why even the smallest business is a potential target What penetration testing is, and […]

Leave a Comment

3 Signs It’s Time to Rethink Your PCI Pen Testing Strategy

Download pdf: 3 sign it’s time to rethink your PCI PenTesting Strategy Learn more about PenTest as a Service

Leave a Comment

Pentests are required for ISO 27001 or SOC2 audits

Pentests are required for ISO 27001 or SOC2 audits: download pdf Why do organizations need to conduct a penetration test?

Comments (1)

APPSEC TESTING APPROACHES

AppSec testing Approach CheatSheet pdf download 5 Things a Pen Tester Looks for When Evaluating an Application PenTest as a Service The Web Application Hacker’s Handbook

Leave a Comment

The Benefits of Automated Penetration Testing

Penetration testing has been one of the industries that are relatively slow adopters of automation. As security firms started automating many parts of the cybersecurity process including scanning and threat intelligence updates, security testing for some time was still mostly about traditional methods. “In the past few years, the use of automation in many spheres […]

Leave a Comment

Network Penetration Testing: A Primer

What is Network Penetration Testing? A network penetration test, or pen test, is a method of assessing a network’s security and identifying vulnerabilities in the network by the intentional use of malicious penetration techniques. In simple terms, an ethical hacker tries to hack your organization’s network, with your permission, to reveal underlying security risks to […]

Leave a Comment

Amazon Web Services (AWS) Pentesting Resources

Leave a Comment

Fake Amazon gift card emails deliver the Dridex malware

The Dridex malware gang is delivering a nasty gift for the holidays using a spam campaign pretending to be Amazon Gift Cards. Dridex phishing campaign wants to send a gift When distributing malware, malware gangs commonly use current events and the holidays as themes for phishing campaigns to lure people into opening malicious attachments. Such […]

Leave a Comment

Black Hat USA Announces New Community Programs to Address the Needs of Information Security Professionals

Programs will address diversity and inclusion, mental health and career education. “The technical content that is presented on the Black Hat stage each year is an important contribution to the industry, but we’ve found that more sensitive topics such as mental health and diversity within the information security community are often not highlighted enough,” said […]

Leave a Comment

Why do organizations need to conduct a penetration test?

12 desirable reasons why an organization should carry out a penetration test:  Assess potential business and operational impacts of successful attacks and determine the feasibility of a particular set of attack vectors.  Identify higher-risk vulnerabilities resulting from lower-risk vulnerabilities exploited in a particular way. To comply with security regulations or standards, e.g. ISO 27001, NIST […]

Comments (1)

Have you heard about the Pwn Phone 2014?

by Jamie Titchener If you have to undertake vulnerability scans or penetration tests at remote sites as part of your day-to-day activities, having to lug around a laptop and other scanning and penetration testing kit can be a real pain. Having the right tools for the job is crucial. But how can you ensure you […]

Leave a Comment

8 Best Books That Every Budding #Hacker Must Read

Everyone knows that a hacker by extension is always a programmer. What many don’t know though is that there is a lot more to it. It’s not just about knowing the language. A hacking is mainly defined by his curiosity to know what is otherwise not to be known. While the following books are on a […]

Leave a Comment

PENETRATION TESTING & ISO27001

Penetration testing (often called “pen testing” or “security testing”) establishes whether or not the security in place to protect a network or application against external threats is adequate and functioning correctly. It is an essential component of most ISO27001 and UK public sector contracts. Why would my company need penetration testing services? In a world […]

Comments (1)