Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Breach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint. The breach of outsourcing firm…

View More Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro
What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly…

View More What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams
Six Stages of Penetration Testing

Six Stages of Penetration Testing

Through penetration testing, you can proactively identify the most exploitable security weaknesses before someone else does. However, there’s a lot more to it than the…

View More Six Stages of Penetration Testing
Penetration Testing: Breaking in to Keep Others Out

Penetration Testing: Breaking in to Keep Others Out

Penetration testing is a direct test of an application, a device, a website, an organization, and even the people that work at an organization. It…

View More Penetration Testing: Breaking in to Keep Others Out