Scorpiones Group


Phishing Campaign

Phishing Attacks increase During The Holidays

Spring in Israel isn’t just about blooming flowers and holiday vacations. It’s also peak season for phishing when scammers use email, text messages, and fake websites to trick people into giving up th..

WPA3 Hacking

Security Flaws in WPA3 Protocol Lets Attackers Hack your WiFi Password

Security researchers have discovered several serious vulnerabilities in the WPA3 that could allow attackers to recover the password of the Wi-Fi network using downgrade attacks or side-channel leaks. ..

Closeup code

The difference between Penetration Testing and Red Team

Penetration testing versus red teaming. We often hear them used together, but in fact, they’re two different things. So, what exactly is the difference between the terms between penetration testing an..

Scorpiones Mobile

10 Ways to Secure Your Mobile Device

Learn how to protect your mobile device from hijacking and malware, Dvir Levi from Scorpiones gives you 10 ways to secure your smartphone. read all about it now...

Nimrod Levy and Tomer Zait

ReDTunnel - Explore Internal Networks With DNS Rebinding

DNS rebinding is a class of exploit in which the attacker initiates repeated DNS queries to a domain under their control, while the first query would return a valid response that passes security check..

Security Screen

Protecting the important assets of your business

You’ve invested in security solutions to protect your business from cyber attacks. But you also know that no solution is 100% bulletproof – the attackers are going to find their way in somehow. With t..

Security Camera

How to maintain your facebook privacy

How to use Facebook and keep some of your privacy: endless year of privacy scandals may have been the biggest cyber security story of 2018. So you may be wondering if it’s even possible to use Faceboo..


How to keep your passwords safe

How to keep your passwords from being an attacker’s key to your account, The whole point of a password is to keep unauthorized people out of your accounts. But when not constructed and used properly, ..

Contact Us