Scorpiones Group
Loading

Articles

WhatsApp Hacking

Car hacking explained and best practice

Automotive hacking or car hacking has become a recent concern for both driven and driverless cars, a new attack surface through which to access the vehicle’s delicate Controller Area Network (CAN) bus..

WhatsApp Hacking

New vulnerability in WhatsApp allows a GIF image to hack your Android phone

WhatsApp has recently patched a critical security vulnerability in its app for Android, which remained unpatched for at least 3 months after being discovered, and if exploited, could have allowed remo..

Wi-Fi Protocols

The Difference Between WEP, WPA, and WPA2 Wi-Fi protocols

Pretty much everywhere you go today, there is a WiFi network you can connect to. Whether it be at home, at the office or at the local coffee shop. Every WiFi network is setup with some kind of network..

Purpose of reconnaissance in red team

Like a Special Forces Unit - Red Team Operations Require Planning, Recon and Equipment

The second phase of a red team assessment is reconnaissance. In this phase, the red team attempts to collect information relevant to the assessment while keeping as low of a profile as possible. In or..

Patch Management

Streamlining Patch Management

Patching not only keeps systems and applications running smoothly, it’s also one of the core activities involved in keeping today’s organizations secure. Leaving machines unpatched makes them vulnerab..

Kubernetes & Dockers Best Practice

Why you need Kubernetes and Dockers and what can it do?

Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. while docker is a Package ..

Spoof Caller ID

Caller ID Spoofing – What It Is and What to Do About It

If you have ever received a call where the caller said that you called them when you have not, then your number was most likely spoofed by another person. Worried? you should be! read more now...

Vishing - Voice phishing

What is Vishing? Voice Phishing Scams Explained & How to Prevent Them

Most of us have been trained to be careful of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations to improve..

GDPR Compliance

GDPR and Penetration Testing: What You Need to Know

In this article we will help you understand what is GDPR, and more specifically, how GDPR relates to security and penetration testing...

Contact Us

SEND A MESSAGE