Pretty much everywhere you go today, there is a WiFi network you can connect to. Whether it be at home, at the office or at the local coffee shop. Every WiFi network is setup with some kind of network..
The second phase of a red team assessment is reconnaissance. In this phase, the red team attempts to collect information relevant to the assessment while keeping as low of a profile as possible. In or..
Patching not only keeps systems and applications running smoothly, it’s also one of the core activities involved in keeping today’s organizations secure. Leaving machines unpatched makes them vulnerab..
Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. while docker is a Package ..
If you have ever received a call where the caller said that you called them when you have not, then your number was most likely spoofed by another person. Worried? you should be! read more now...
Most of us have been trained to be careful of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations to improve..
In this article we will help you understand what is GDPR, and more specifically, how GDPR relates to security and penetration testing...
Penetration tests are a great way to detect holes in your security defenses. With the help of security experts you can identify vulnerabilities and learn what actions to take to protect your business ..
When it comes to how dangerous a cyber attack is, the answer is potentially devastating, Penetration testing is an everyday part of the job description for us here at Scorpiones. In fact, it’s our sp..