In the need to increase their cyber security resilience, companies start searching for cyber security trainings. This thing, in fact, is a very normal and recommended action. But there are many times when they find themselves in one of these three situations: There are too many options Trainings are too expensive and the overall quality […]
Tag: Cyber Threat Defense
How to expand your attack surface
with Reverse IP lookups Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface? When you run out of options for breaking into one door, you might want to try […]
Can we detect APT attacks?
In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is there any way to detect APT infections? The answer is yes. Yet, detecting APT attack is a real challenge and requires […]