Scorpiones Group
Loading

Articles

SMBleed New Critical Windows 10 Vulnerability

SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol

Cybersecurity researchers recently uncovered a new critical vulnerability affecting the Server Message Block (SMB) protocol that could allow attackers to leak kernel memory remotely..

Microsoft Releases a Critical Patch for 'Wormable' SMBv3 Vulnerability on Windows 10

Microsoft Releases a Critical Patch for 'Wormable' SMBv3 Vulnerability on Windows 10

Microsoft has discovered and released an emergency patch to a very dangerous “Wormable SMBv3 Vulnerability” that could affect millions of computers worldwide...

WiFi Security

Network Defense - Leave it to the professionals.

Many business owners believe that they aren’t in risk of being attacked. If you’re using WiFi at your organization to connect to the Internet from your computer or mobile devices, you could become the..

Wi-Fi Protocols

The Difference Between WEP, WPA, and WPA2 Wi-Fi protocols

Pretty much everywhere you go today, there is a WiFi network you can connect to. Whether it be at home, at the office or at the local coffee shop. Every WiFi network is setup with some kind of network..

Penetration testing

What Are The Different Types Of Security Penetration Testing

Penetration tests are a great way to detect holes in your security defenses. With the help of security experts you can identify vulnerabilities and learn what actions to take to protect your business ..

Penetration testing for business

What is penetration testing and do i need it in my business?

When it comes to how dangerous a cyber attack is, the answer is potentially devastating, Penetration testing is an everyday part of the job description for us here at Scorpiones. In fact, it’s our sp..

WPA3 Hacking

Security Flaws in WPA3 Protocol Lets Attackers Hack your WiFi Password

Security researchers have discovered several serious vulnerabilities in the WPA3 that could allow attackers to recover the password of the Wi-Fi network using downgrade attacks or side-channel leaks. ..

Closeup code

The difference between Penetration Testing and Red Team

Penetration testing versus red teaming. We often hear them used together, but in fact, they’re two different things. So, what exactly is the difference between the terms between penetration testing an..

Nimrod Levy and Tomer Zait

ReDTunnel - Explore Internal Networks With DNS Rebinding

DNS rebinding is a class of exploit in which the attacker initiates repeated DNS queries to a domain under their control, while the first query would return a valid response that passes security check..

Contact Us

SEND A MESSAGE