PowerShell Remoting and WMI risksWhat is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services... BLOG How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,... Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
PowerShell Remoting and WMI risksWhat is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...
BLOG How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,... Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,...
Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that...
What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...