Red teaming is a simulated cyber attack that assesses an organisation’s security by having security professionals act as pseudo-hackers to identify and exploit vulnerabilities. The scope can be open or closed, and the end goal is to provide a detailed report on vulnerabilities, methods used, and advice on fixing them, covering a range of potential attack vectors
While internet security may not be a top priority when starting a business, ignoring potential risks can be disastrous. One of the mistakes executives and managers make is assuming their company is less vulnerable to cyber-attacks than larger corporations. Small businesses, on the other hand, have an equal probability of becoming victims of cybercrime. The most frequent cause for this is that SMEs may lack the resources that larger corporations do. This leaves them more susceptible to cyberattacks and less likely to survive a successful attack.
Mobile Application Penetration Testing often has a different flow to web application or network testing. This is because not only do you get an application but you also get the software itself. This runs on a device you control and allows for a much wider attack surface. It also allows DE compilation of code and hooking of calls all in service of attacking the application. As such, mobile app pentesting requires an entirely different skill set, knowledge base and methodology. Most mobile application penetration tests rely on the OWASP-MASVS (Mobile Application Security Verification Standard). Senior application developers and hackers are responsible for developing this to ensure that applications meet minimum security requirements. The content in this blog comes from the OWASP-MSTG which is one of the most complete methodologies available.
The threat of smart home devices is growing. It’s almost 2022 and the market for IOT or smart devices is exploding. In fact, one estimate predicts there will be 21 billion IOT devices by the end of 2021! This innovation explosion means it is now possible to purchase a kettle that we can switch on … Read more
Wireless networks are generally a weaker alternative to a hardwire connections. Why is this? Well, if the wireless network’s traffic is open, then anyone within range can gain access which means it’s vulnerable to a ‘sniffing attack’. Modern wireless networks get around this by using encryption that requires a secret key. How are wireless networks … Read more