Our team’s vulnerability disclosures 2021

Pentesters use a comprehensive and complete toolkit to…


v4.1 Released

Since our last version came out, we have dedicated…


AWS Common Issues – Part 2

Pentesters use a comprehensive and complete toolkit to…


Cybersecurity is a secondary objective, and that’s what we’ve been getting wrong.

A rapidly growing business must choose where to locate its…


Continuous testing, continuous security

Cybersecurity as a constant race, in which attackers and…


Password strength

Passwords are the first aspect of computer security we…


Understanding Spring4Shell

According to Cisco’s Annual Internet Report, nearly…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…