Topics
Topics
The field is empty
Proactive and Preventative Security Measures
Despite major investments in their security suites, organizations continue to be breached. Our Co-founder and CTO, Arik Liberzon, recently sat down ...

Securing MongoDB with Data-at-Rest Encryption

In this post, we will examine one method of encrypting data-at-rest, specifically how to achieve Data-at-Rest Encryption for MongoDB Community Editi...

Best Practices for Migrating from CentOS to Ubuntu

After CentOS 8 was declared end-of-life (EOL), we had to plan a CentOS to Ubuntu migration as an alternative operating system (OS) for our on-premis...

Effective Strategies for Bypassing Antivirus

In this article, we will show how it’s possible to use reflective loading to run Mimikatz while evading detection by Windows Defender. While this is...

Assessing Your Attack Surface from an Attacker’s Perspective

In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams w...

Techniques for Bypassing Air-Gapped Networks

Introduction 'Air-gapped' networks are often considered the gold standard for isolating sensitive systems from external threats. However, these net...
2024 State of Pentesting Survey
Download

Limitations of CVE Management as a Primary Strategy

With only about 15% of vulnerabilities actually exploitable, patching every vulnerability is not an effective use of time.   As a...

Enhancing QA with Shift-Left Testing

This article is part of Pentera’s Engineering Series – a behind-the-scenes look at the technologies we develop to keep companies secure. In this pie...
5 steps to mitigate risk of credential exposure

Steps to Mitigate Credential Exposure Risks

Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These c...
Begin your security validation journey
Request a demo
Book your demo now >
WiFi, the untested attack surface
Much of a company’s assets are connected to Wi-Fi networks. However, security teams are often less likely to validate these networks. This pushed us...

The Ultimate Security Validation Checklist for CISOs

If you're heading out of the office on a well-deserved vacation, are you certain the security controls you have in place will let you rest easy whil...

The Shift from Port 445 to Port 135 in Cybersecurity

If we could nominate a command-line utility for an award, PsExec would undoubtedly win the "Most Useful" category. This tool enables administrators ...

Protecting Data from XSS Vulnerabilities in Azure

Cloud-based services are a growing asset for enterprises to optimize scale and reduce deployment efforts. In our research, we found a web XSS...
EASM2
Importance of External Attack Surface Management
External Attack Surface Management (EASM) tools have been around for some time, but only recently has Gartner recognized this category as a top tren...

Understanding the Security Aspects of Linux eBPF

2022 discoveries of new privilege escalation techniques Reading this blog will allow you to understand the eBPF mechanism and how a fairly sm...

Mitigating VMware vCenter Information Disclosure

  New zero-day vulnerability joins a chain of recently discovered vulnerabilities capable of operating an end-to-end attack on ESXi. Org...
4 steps

4 Steps to Knowing Your Exploitable Attack Surface

According to a Cisco CISO Benchmark survey, 17% of organizations had 100,000 or more daily security alerts in 2020, a number that has only incre...
The Buyer's Guide to Security Validation
Download

Correcting Common Firewall Misconfigurations

  Network misconfigurations take on many types and forms, and come about for many different reasons. Many of them stem from blind adhere...