Blog

Blog

AI Is Shaping Cyber Threats: How Organizations Can Stay Ahead

Security alerts never stop; they flood in, one after another. AI runs quietly in the background, sorting through a plethora of data, making snap decisions, and raising red flags when it finds anomalies. Unfortunately, somewhere else, bad actors are running similar algorithms, monitoring, probing, and learning. Efficiency (speed and scale) isn’t the danger, nor is the way security teams use these...
Blog

The MedusaLocker ransomware gang is hiring penetration testers

MedusaLocker, the ransomware-as-a-service (RaaS) group that has been active since 2019 is openly recruiting for penetration testers to help it compromise more businesses. As Security Affairs reports, MedusaLocker has posted a job advert on its dark web leak site, which pointedly invites pentesters who already have direct access to corporate networks to make contact."If you don't have access,...
Blog

Stop Cyber Threats Before They Cost You: Protecting Financial Services with Fortra

Two in three financial institutions faced cyberattacks in 2024, and that trend shows little sign of letting up. Because of their valuable data – hooked conveniently to direct financial information – FinServ organizations are perennial targets for hungry attackers. But this isn’t news to anybody. Financial institutions understand the threats, and for the most part, they are some of the most...
Blog

VERT Threat Alert: January 2025 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s January 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1139 as soon as coverage is completed.In-The-Wild & Disclosed CVEsCVE-2025-21333The first of three Hyper-V vulnerabilities this month is a heap-based buffer overflow that leads to privilege escalation to SYSTEM. Microsoft has reported this...
Blog

What is Web Application Penetration Testing?

These days, it seems like most businesses are dealing with a cybersecurity attack that leaks sensitive information to the public and wreaks havoc on their day-to-day operations. Vulnerability scans are a way to identify areas of weakness within an online security network, but they are not enough. Scanning for web application vulnerabilities in conjunction with penetration testing is a more...
Blog

7 Reasons to Schedule Your Next Penetration Test

A foundational component of any security program is ensuring that the organization has a clear understanding of where risk resides. One of the most effective ways to understand infrastructure weaknesses and test your defenses is with a penetration test (aka: ethical hacking) assessment.The growing number of malware and ransomware attacks is a key indicator of the severity of risk for organizations...
Blog

Penetration Test Pitfalls to Avoid

While pen testing has been around since the 1960s, not all organizations have yet perfected the art of conducting them. In fact, not all companies are taking advantage of them, but that’s a conversation for another time.Below are a few common pitfalls that even experienced security teams fall victim to from time to time.Wrong FrequencyPenetration tests evaluate your security posture at the moment...
Blog

What Is Penetration Testing? Tools and Techniques

We live in an online world in which more and more people rely on services provided over the internet. Being able to access so much through a smartphone has certainly ushered in a great deal of convenience. No more trips to the bank to deposit paychecks and no more weekends stuck behind a shopping cart—today, with a few clicks, we can transfer money and order much-needed supplies online from Amazon...
Blog

Phishing Attacks - What is Phishing?

Although phishing attacks can occur against individuals, we will primarily focus on attacks against organizations in this post. We will use the term organization to represent governments, educational and healthcare institutions, and commercial businesses, but we will draw distinctions in the “bounty” sought after in each industry. So, let’s get started…What is Phishing?There are lot of “nice” or ...
Blog

Penetration Testing Tools You Can Use

Pen testing always includes a vulnerability assessmentPenetration testing is all about identifying network security weaknesses before they are exploited internally or externally. The best pen testers bring a range of tools and experience to each gig and a key tool they will use is vulnerability assessment.The experience level, tools used, findings and the report you get from each penetration test...
Blog

How to Get Started with NIST 800-171 Compliance

Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog

IT Risk Mitigation

It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks. You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least. And it's matched by skyrocketing consumer demand for and reliance on online services. Bottom line: outages are more dangerous to a company...