by Miguel Morales | Nov 5, 2020 | IT Support
Almost every penetration test starts with the finding of a low-hanging fruit powered by phishing techniques. This one (Evilginx) is capable of bypassing Google’s high-guarded security walls, but it doesn’t limit to work for other defenses. How does Evilginx...
by Miguel Morales | Nov 5, 2020 | IT Support
Google Project Zero is the elite group of white hat hackers reporting exploits. This time, they reported a zero-day vulnerability. Remember when we talked about Google’s Bug Bounty program? These (Project Zero) isn’t formed by rookies. Google’s Project...
by Miguel Morales | Nov 4, 2020 | IT Support
Shamoon, Black Energy, Destover, ExPetr/Not Petya, and Olympic Destroyer: All of these Wiper malware, and others like them, have a singular purpose of destroying systems and / or data, usually causing great financial and reputational damage to the victim companies. ...
by Miguel Morales | Nov 3, 2020 | IT Support
You should begin entering remote connections safely in 2022. This is because more and more vulnerabilities of network, server, device, and database access occur. There are steps we can take to make these remote connections more secure and less likely to cause a...
by Miguel Morales | Nov 2, 2020 | IT Support
Honeypots have been a part of the cybersecurity world for decades. This is because they offer real-world data on the types of threats companies face, and can be a powerful research tool for identifying specific threat vectors. Rather than relying on general passive...
by Miguel Morales | Nov 1, 2020 | IT Support
Cross Site Scripting (XSS) is one of the most popular and vulnerable attacks known to all advanced testers. It is considered one of the riskiest attacks for web applications and can also have damaging consequences. XSS is often compared to similar client-side...