Scorpiones Group
Loading

Articles

Microsoft Releases a Critical Patch for 'Wormable' SMBv3 Vulnerability on Windows 10

Microsoft Releases a Critical Patch for 'Wormable' SMBv3 Vulnerability on Windows 10

Microsoft has discovered and released an emergency patch to a very dangerous “Wormable SMBv3 Vulnerability” that could affect millions of computers worldwide...

Kr00k Wifi Vulnerability

New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices

Security researchers uncovered a new hardware vulnerability in the widely-used Wi-Fi chips..

Ethical Hacker or Penetration Tester

Ethical Hacker or Penetration Tester

Businesses conduct pen tests to strengthen their corporate defense systems. This includes all computer systems and associated infrastructure. We at Scorpiones provide you with a full scale Penetration..

Web Application Penetration Testing On-Demand

Web Application Penetration Testing On-Demand

Our team of experts perform real world attack simulations on your infrastructure to identify existing vulnerabilities and obtain recommendations on how to improve your overall security...

WiFi Security

Network Defense - Leave it to the professionals.

Many business owners believe that they aren’t in risk of being attacked. If you’re using WiFi at your organization to connect to the Internet from your computer or mobile devices, you could become the..

Drupal Hacking

Update Drupal ASAP: Over a million sites can be easily hacked by any visitor

Drupal warns that attackers can exploit the flaw through several avenues. Any visitor, regardless of privileges, can exploit the flaw by visiting an affected site and gain access to, modify and delete..

Safe Online Shopping

Holidays are upon us, here's a few ways to stay cyber-protected while shopping online.

Holidays are upon us, so our experts have compiled a few ways to stay cyber-protected while shopping online for your loved ones...

Red Team Operations

What is Red Team Operations?

Red Team Operations services are just one of Scorpiones’s tools of raising an effective defense against Information Security Threats...

What Is Risk-Based Authentication?

What Is Risk-Based Authentication?

Risk-Based Authentication is a form of strong authentication that calculates a risk score for any given access attempt in real time, based on a predefined set of rules. Users are then presented with a..

Contact Us

SEND A MESSAGE