Scorpiones Group
Loading

Articles

Cyber Security Basics: VPN

Cyber Security Basics: VPN

Your internet connection transmits your IP address thus making it possible to track you online, learn how to keep your connection private...

Cyber Security Basics: Penetration Testing

Cyber Security Basics: Penetration Testing

A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. Want to learn more? click now...

Cyber Security Basics: Incident Response Team

Cyber Security Basics: Incident Response Team

Learn now about Incident Response Team, and how can it assist your organization in remediating cyber-attacks and emerging threats...

Cyber Security Basics: Red Team

Cyber Security Basics: Red Team

In this article we will explain the term “Red Team”, how does a Red Team Operation work and what are it’s benefits. Check it now...

Amid Coronavirus Crisis: Increase In Cyber Attacks

Amid Coronavirus Crisis: Increase In Cyber Attacks

Cyber criminals are taking advantage of the coronavirus crisis, people are distracted and much more vulnerable, everyone is at home practicing social distancing, using their electronic devices more th..

Microsoft Releases a Critical Patch for 'Wormable' SMBv3 Vulnerability on Windows 10

Microsoft Releases a Critical Patch for 'Wormable' SMBv3 Vulnerability on Windows 10

Microsoft has discovered and released an emergency patch to a very dangerous “Wormable SMBv3 Vulnerability” that could affect millions of computers worldwide...

Kr00k Wifi Vulnerability

New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices

Security researchers uncovered a new hardware vulnerability in the widely-used Wi-Fi chips..

Ethical Hacker or Penetration Tester

Ethical Hacker or Penetration Tester

Businesses conduct pen tests to strengthen their corporate defense systems. This includes all computer systems and associated infrastructure. We at Scorpiones provide you with a full scale Penetration..

Web Application Penetration Testing On-Demand

Web Application Penetration Testing On-Demand

Our team of experts perform real world attack simulations on your infrastructure to identify existing vulnerabilities and obtain recommendations on how to improve your overall security...

Contact Us

SEND A MESSAGE