Securing open source software (Part 2)
CybersecPentestingOpen SourceWhitepaper
July 19, 2022
Open-source software increases its presence in data centers, consumer devices, and applications; also, its community continues to grow. Despite the code being available,…
Pentesting toolkit: all you need to know
Vulnerability ManagementPentestingOffensive Security
July 17, 2022
Pentesters use a comprehensive and complete toolkit to expose different platforms and evaluate the security of an IT infrastructure. They safely try to exploit…