Kali Linux is probably the most widely used operating system in the offensive security world... but wrongly so! In fact, there are much better alternatives!
How to avoid fines related to GDPR? The most effective solution is to conduct penetration tests. A complete guide is available in the article below.
How to choose the right tools for an intrusion test? Read more in the article below
What is the budget for an intrusion test?r
XZ Utils has a significant backdoor in its latest versions 5.6.0 and 5.6.1. However, its exploitation is not trivial.
WordPress, as one of the most widely used content management systems (CMS) in the world, powers a significant portion of websites, ranging from personal blogs to corporate sites.
A new class of speculative execution vulnerabilities, named GhostRace, has been discovered in March 2024. This attack is particularly dangerous as it can be used to exploit a wide array of software, including web browsers, operating systems, and critical applications.
Canon, a 20 billion euro multinational corporation, is impacted by 2 critical vulnerabilities that, under certain conditions, can compromise the infrastructure hosting the vulnerable application. Trackflaw shares its discovery and responsible disclosure process.
This article details how a simple vulnerability discovered in late January 2024 could allow an attacker to compromise Jenkins instances.
This article details and explains to the reader the different approaches to a penetration test and how to make the right choice.