Scorpiones Group


Amid Coronavirus Crisis: Increase In Cyber Attacks

Amid Coronavirus Crisis: Increase In Cyber Attacks

Cyber criminals are taking advantage of the coronavirus crisis, people are distracted and much more vulnerable, everyone is at home practicing social distancing, using their electronic devices more th..

Red Team Operations

What is Red Team Operations?

Red Team Operations services are just one of Scorpiones’s tools of raising an effective defense against Information Security Threats...

Kubernetes & Dockers Best Practice

Why you need Kubernetes and Dockers and what can it do?

Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. while docker is a Package ..

GDPR Compliance

GDPR and Penetration Testing: What You Need to Know

In this article we will help you understand what is GDPR, and more specifically, how GDPR relates to security and penetration testing...


How to Delete Synced Information in Chrome Browser

When you sign in to Chrome using your Google Account, a lot of your personal information gets saved and synced across all your devices, from an Information Security aspect, this is a nightmare...

Information Security Awareness at Work

10 Tips for Information Security Awareness

Employees play a crucial role in running a successful business. An untrained and negligent workforce can put your enterprise in danger of multiple data breaches. Organizations must adopt an easy to ac..

App permission safety

Protecting Your Data Through App Permissions

Requesting (and being given) permission for an app to perform operations that can provide access to user credentials, personal documents and images, personally identifiable or health information throw..

Phishing Campaign

Phishing Attacks increase During The Holidays

Spring in Israel isn’t just about blooming flowers and holiday vacations. It’s also peak season for phishing when scammers use email, text messages, and fake websites to trick people into giving up th..

Closeup code

The difference between Penetration Testing and Red Team

Penetration testing versus red teaming. We often hear them used together, but in fact, they’re two different things. So, what exactly is the difference between the terms between penetration testing an..

Contact Us