Scorpiones Group


Purpose of reconnaissance in red team

Like a Special Forces Unit - Red Team Operations Require Planning, Recon and Equipment

The second phase of a red team assessment is reconnaissance. In this phase, the red team attempts to collect information relevant to the assessment while keeping as low of a profile as possible. In or..

Vishing - Voice phishing

What is Vishing? Voice Phishing Scams Explained & How to Prevent Them

Most of us have been trained to be careful of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations to improve..

Penetration testing

What Are The Different Types Of Security Penetration Testing

Penetration tests are a great way to detect holes in your security defenses. With the help of security experts you can identify vulnerabilities and learn what actions to take to protect your business ..

Penetration testing for business

What is penetration testing and do i need it in my business?

When it comes to how dangerous a cyber attack is, the answer is potentially devastating, Penetration testing is an everyday part of the job description for us here at Scorpiones. In fact, it’s our sp..

Organization network

ReDTunnel - Redefining DNS Rebinding Attack

Have you ever thought about how to access a victim's internal network without running Malware on his computer or using 0day?..

Are you human?

The difference between reCAPTCHA v2 and v3

As bots that try to pass as actual humans become more sophisticated, Google has released new versions of its reCAPTCHA API. The most recognized version of this test involves typing in distorted text, ..

AI Malware

AI Infused Malware Is The New Security Threat To Worry About

A work of fiction? Is the future is here? In this article you will learn that in the near future, Artificial Intelligence will be able to hack, manipulate and compromise your organization's or persona..

WPA3 Hacking

Security Flaws in WPA3 Protocol Lets Attackers Hack your WiFi Password

Security researchers have discovered several serious vulnerabilities in the WPA3 that could allow attackers to recover the password of the Wi-Fi network using downgrade attacks or side-channel leaks. ..

Closeup code

The difference between Penetration Testing and Red Team

Penetration testing versus red teaming. We often hear them used together, but in fact, they’re two different things. So, what exactly is the difference between the terms between penetration testing an..

Contact Us