A real Red Team Exercise, how to get in? In this article, we’ll be talking about a red teaming assessment on a FinTech company, what has taught us and what we have actually learned from it. Today organizations know they… Read More

A real Red Team Exercise, how to get in? In this article, we’ll be talking about a red teaming assessment on a FinTech company, what has taught us and what we have actually learned from it. Today organizations know they… Read More
As we all know, Metaverse was announced to be launched by Mark Zuckerberg. This seems to be the next wave of computing which will also involve a deeper understanding of the user’s behavior and privacy details. This information will create… Read More
Introduction to intellectual property Copyright, patents, trademarks, industrial design, geographical indications, trade secrets, there are so many things that fall under the category “intellectual property”. But what in fact is intellectual property? Generally speaking, intellectual property is characterized as a… Read More
Tips to protect your mobile devices There is no secret that nowadays the technology we use can make us a target to cyber-attacks if we do not have basic knowledge on how to properly protect against these. No manual comes… Read More
Working onsite in cybersecurity Even if the pandemic situation is still present in our daily lives, cybersecurity doesn’t have to stop. And sometimes working in this field requires engineers to travel to the client’s location to work. There are many… Read More
How to keep your crypto wallet safe? As cryptocurrencies become more popular and valuable, more and more cybercriminals are turning their attention to them. There are 2 main types of crypto wallets: hot wallets and cold wallets. Hot wallets are… Read More
How to secure web and mobile applications Security online is crucial, and we all can imagine why. Hacks and breaches could have a huge negative impact on companies: Loss of customer trust; Financial losses; Leaked user data; Legal issues. You… Read More
How to keep yourself invisible on the web? Did you ever wanted to be invisible? Pretty hard to achieve this in real life. But can you be invisible online? Well, there are 2 ways of doing it. One in which… Read More
How to keep your identity and your personal financial information safe in 2021 Surfing the internet Nowadays, billions of people use the Internet and are sharing their personal information through social media and different other ways. Knowing how to keep… Read More
How to Bypass RootBeer’s Root Detection During the android penetration testing process, one of the challenges is to bypass root detection in order to be able to access the target application folder on the device. The most common library that… Read More