OUR BLOG
GDPR vs CCPA
This revised blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the State of California Consumer Privacy Act. Please check to see what’s new, since some changes have been recently included in the CCPA. The GDPR,...
How Ransomware Works and How to Prevent Infection
With Ransomware attacks being reported almost daily we thought that it would be helpful to answer some simple questions about this type of cyberattack. In this article we are going to discuss in simple terms what Ransomware is, how the actual attack is carried...
Advanced Level Resources For Web Application Penetration Testing
Following the blogposts that identified entry & mid-level resources for the penetration testing professional we will end this series with a list of advanced resources. If you haven’t read the two previous posts, we highly recommend to do so in order to get a more...
Introducing Rootend 2.0.2
Intro Rootend is an open source python-based tool that helps penetration testers and CTF players with their *nix Enumeration needs and also acts as an Auto Privilege Escalation tool. Rootend’s main goal is to pinpoint enumeration and exploitation of system...
Intermediate Level Resources For Web Application Penetration Testing
Following the previous blogpost of this series regarding entry level resources for penetration testing, we are going to proceed with a list of referenced material focusing on web application penetration testing. Mainly, some handy Burp Extensions, resources for...
Smishing in the time of Covid-19
During the current pandemic the GSM network is used by the states around the globe for sending SMS notifications to the public. Due to a twenty-year-old issue that still plagues online SMS platforms, we believe that this is a first-class opportunity to raise awareness...