In the need to increase their cyber security resilience, companies start searching for cyber security trainings. This thing, in fact, is a very normal and recommended action. But there are many times when they find themselves in one of these… Read More
How to expand your attack surface
with Reverse IP lookups Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface? When… Read More
Can we detect APT attacks?
In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is there any way to detect APT… Read More