Scorpiones Group
Loading

Articles

Kubernetes & Dockers Best Practice

Why you need Kubernetes and Dockers and what can it do?

Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. while docker is a Package ..

GDPR Compliance

GDPR and Penetration Testing: What You Need to Know

In this article we will help you understand what is GDPR, and more specifically, how GDPR relates to security and penetration testing...

Clouds

How to Delete Synced Information in Chrome Browser

When you sign in to Chrome using your Google Account, a lot of your personal information gets saved and synced across all your devices, from an Information Security aspect, this is a nightmare...

Information Security Awareness at Work

10 Tips for Information Security Awareness

Employees play a crucial role in running a successful business. An untrained and negligent workforce can put your enterprise in danger of multiple data breaches. Organizations must adopt an easy to ac..

App permission safety

Protecting Your Data Through App Permissions

Requesting (and being given) permission for an app to perform operations that can provide access to user credentials, personal documents and images, personally identifiable or health information throw..

Phishing Campaign

Phishing Attacks increase During The Holidays

Spring in Israel isn’t just about blooming flowers and holiday vacations. It’s also peak season for phishing when scammers use email, text messages, and fake websites to trick people into giving up th..

Closeup code

The difference between Penetration Testing and Red Team

Penetration testing versus red teaming. We often hear them used together, but in fact, they’re two different things. So, what exactly is the difference between the terms between penetration testing an..

Nimrod Levy and Tomer Zait

ReDTunnel - Explore Internal Networks With DNS Rebinding

DNS rebinding is a class of exploit in which the attacker initiates repeated DNS queries to a domain under their control, while the first query would return a valid response that passes security check..

Security Screen

Protecting the important assets of your business

You’ve invested in security solutions to protect your business from cyber attacks. But you also know that no solution is 100% bulletproof – the attackers are going to find their way in somehow. With t..

Contact Us

SEND A MESSAGE