Fortra has 3 tools for pen-testers and red-teams. In this bolg I quickly go through what each tool does and where it fits within the market. I then provide links… Read More »Fortra’s Tools for Pen Testers and Red Teams
Cobalt Strike and Endpoint Detection & Response (EDR) solutions Recently a customer provided feedback that some EDR tools were beginning to detect Cobalt Strike. Historically, Cobalt Strike managed to effectively… Read More »What are Cobalt Strike doing to evade EDR?
Background In 2022 Tenable released a new product, Nessus Expert. This blog post is a comparison of the two Tenable products Nessus Pro vs Nessus Expert and highlights the similarities… Read More »Nessus Pro vs Nessus Expert, what is the difference?
Core Impact is releasing something new this year. In the meantime, they made some updates to their product. First, they have a new agent written in Python so that it… Read More »Core Impact Updates: Python Agents and OWASP Top 10
A predictable and efficient Software Development Lifecycle (SDLC) is crucial for delivering modern web applications on schedule, in scope, and within budget. As attack surfaces expand and malicious activity continues… Read More »Get a comprehensive view of your web security posture within your SDLC
Get Your Complimentary eBook When it comes to Vulnerability Management if you want to carry out automating processes and standardise things, then you’ll need to have clearly defined rules on… Read More »vulnerability management programme and automating processes Free e-Book
With ransomware attacks now becoming the norm and a huge threat to organisations, ranging from small to enterprise, I thought it worthwhile to look at the profile of a ransomware… Read More »Profile of a “Ransomware Attack” and how to prevent it