Scorpiones Group
Loading

Articles

Patch Management

Streamlining Patch Management

Patching not only keeps systems and applications running smoothly, it’s also one of the core activities involved in keeping today’s organizations secure. Leaving machines unpatched makes them vulnerab..

Kubernetes & Dockers Best Practice

Why you need Kubernetes and Dockers and what can it do?

Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. while docker is a Package ..

Spoof Caller ID

Caller ID Spoofing – What It Is and What to Do About It

If you have ever received a call where the caller said that you called them when you have not, then your number was most likely spoofed by another person. Worried? you should be! read more now...

Vishing - Voice phishing

What is Vishing? Voice Phishing Scams Explained & How to Prevent Them

Most of us have been trained to be careful of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations to improve..

GDPR Compliance

GDPR and Penetration Testing: What You Need to Know

In this article we will help you understand what is GDPR, and more specifically, how GDPR relates to security and penetration testing...

Penetration testing

What Are The Different Types Of Security Penetration Testing

Penetration tests are a great way to detect holes in your security defenses. With the help of security experts you can identify vulnerabilities and learn what actions to take to protect your business ..

Penetration testing for business

What is penetration testing and do i need it in my business?

When it comes to how dangerous a cyber attack is, the answer is potentially devastating, Penetration testing is an everyday part of the job description for us here at Scorpiones. In fact, it’s our sp..

Organization network

ReDTunnel - Redefining DNS Rebinding Attack

Have you ever thought about how to access a victim's internal network without running Malware on his computer or using 0day?..

Are you human?

The difference between reCAPTCHA v2 and v3

As bots that try to pass as actual humans become more sophisticated, Google has released new versions of its reCAPTCHA API. The most recognized version of this test involves typing in distorted text, ..

Contact Us

SEND A MESSAGE