
SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol
Cybersecurity researchers recently uncovered a new critical vulnerability affecting the Server Message Block (SMB) protocol that could allow attackers to leak kernel memory remotely
Initializing security protocols...
Explore 9 articles related to Network Penetration Testing
Cybersecurity researchers recently uncovered a new critical vulnerability affecting the Server Message Block (SMB) protocol that could allow attackers to leak kernel memory remotely
Microsoft has discovered and released an emergency patch to a very dangerous “Wormable SMBv3 Vulnerability” that could affect millions of computers worldwide.
Many business owners believe that they aren’t in risk of being attacked. If you’re using WiFi at your organization to connect to the Internet from your computer or mobile devices, you could become the victim of a WiFi hacker unless you protect your network.
Pretty much everywhere you go today, there is a WiFi network you can connect to. Whether it be at home, at the office or at the local coffee shop. Every WiFi network is setup with some kind of network security, either open for all to access or extremely restricted where only certain clients can connect. Even if you know you need to secure your Wi-Fi network (and have already done so), you probably find all the security protocols little bit confusing.
Penetration tests are a great way to detect holes in your security defenses. With the help of security experts you can identify vulnerabilities and learn what actions to take to protect your business and prevent attack.
When it comes to how dangerous a cyber attack is, the answer is potentially devastating, Penetration testing is an everyday part of the job description for us here at Scorpiones. In fact, it’s our specialty. If you ever asked yourself 'what is penetration testing and do i need it?' Here’s what you need to know.
Security researchers have discovered several serious vulnerabilities in the WPA3 that could allow attackers to recover the password of the Wi-Fi network using downgrade attacks or side-channel leaks. And what's disturbing is that it can supposedly be done relatively fast and cheap. Learn more
Penetration testing versus red teaming. We often hear them used together, but in fact, they’re two different things. So, what exactly is the difference between the terms between penetration testing and red team?
DNS rebinding is a class of exploit in which the attacker initiates repeated DNS queries to a domain under their control, while the first query would return a valid response that passes security checks, and the subsequent queries will return a malicious response that targets the internal network.