Threat actors are leaping over traditional barriers with ease, demanding sharper defenses for our widening attack surfaces. They are constantly on the move, probing IT infrastructure to identify vulnerable systems – including unpatched endpoints, network misconfigurations, unsecured APIs, and long-forgotten cloud permissions. Keeping up with network changes and closing these security gaps is a never-ending, manual endeavor that saps IT resources, time, and morale. The result: unnecessary security risk. After all, you can’t secure what you don’t know about.
Tag: #pentesting
CISA Broke Into a Federal Agency and Remained There For 5 Months.
CISA calls these SILENTSHIELD assessments. The agency’s dedicated red team picks a federal civilian executive branch (FCEB) agency to probe and does so without prior notice – all the while trying to simulate the maneuvers of a long term hostile nation-state threat group.
Google guru roasts useless phishing tests, calls for fire drill-style overhaul • The Register
The main argument against current phishing tests is “there is no evidence that the tests result in fewer incidences of successful phishing campaigns,” said Linton.
1st Rule of Cyber Security Testing
The First Rule of Cyber Security Testing: Do No Harm!
Hands-On: Kali Linux on the Raspberry Pi 4
https://www.zdnet.com/article/hands-on-kali-linux-on-the-raspberry-pi-4/
Podcast – DarkNet Diaries – The Big House
The Big House Episode of the DarkNet Diaries
Penetration Testing — 100 Terms You Need To Know | by Manish Shivanandhan | Manish Shivanandhan’s Blog | Sep, 2020 | Medium
https://medium.com/manishmshiva/penetration-testing-100-terms-you-need-to-know-a723c38cd8c8