Microsoft and Okta Targeted by LAPSUS$
Microsoft and Okta, a provider of authentication services, said they are looking into claims of a possible breach made by LAPSUS$.
Microsoft and Okta, a provider of authentication services, said they are looking into claims of a possible breach made by LAPSUS$.
Mobile Application Penetration Testing often has a different flow to web application or network testing. This is because not only do you get an application but you also get the software itself. This runs on a device you control and allows for a much wider attack surface. It also allows DE compilation of code and hooking of calls all in service of attacking the application. As such, mobile app pentesting requires an entirely different skill set, knowledge base and methodology. Most mobile application penetration tests rely on the OWASP-MASVS (Mobile Application Security Verification Standard). Senior application developers and hackers are responsible for developing this to ensure that applications meet minimum security requirements. The content in this blog comes from the OWASP-MSTG which is one of the most complete methodologies available.
The threat of smart home devices is growing. It’s almost 2022 and the market for IOT or smart devices is exploding. In fact, one estimate predicts there will be 21 billion IOT devices by the end of 2021! This innovation explosion means it is now possible to purchase a kettle that we can switch on … Read more
Passwords are often the weakest part of an organisation’s or individual’s security. Often passwords are easy to guess, reused, or stored improperly, meaning a hacker with enough skill can gain access to
If the name doesn’t already sound strange enough, wait until you see what you can do with Google Dorking. Before we dive deep into how we can use Google Dorking. We must first look at search engines themselves. What is a search engine? A search engine can be thought of as a behemothic database, however, … Read more
We all know that skilled hackers are only as good as the tools they use – whether they are self-made or widely available to download, professionals rely on tools to speed up tests and complete tasks which would otherwise not be humanly possible (such as exploit’s with race conditions, for example). So, here they are; Sencode Cyber Security’s top 5 hacking tools as of February 2021.
Pen testing is one of those sneaky terms in the English language which describes a whole suite of different services, but the unifying trait within its constituents is that they are all characterised by a ‘simulated cyber-attack’.
Earlier today, on the 19th of May 2020 we found out that 9 million customers have had some of their personal information stolen from EasyJet. The extent of this hack at the moment seems to be that 2200 people have had their credit card details stolen and have been notified, although we expect further developments … Read more
As an individual’s online presence grows, the amount of information an attacker can use against them grows with it. Everyone has heard of a story of some online personalities’ information being leaked online. But very few people know how this happens and why it is so common. Many of these ‘Hacks’ of personal information never … Read more