Blog

Blog

The MedusaLocker ransomware gang is hiring penetration testers

MedusaLocker, the ransomware-as-a-service (RaaS) group that has been active since 2019 is openly recruiting for penetration testers to help it compromise more businesses. As Security Affairs reports, MedusaLocker has posted a job advert on its dark web leak site, which pointedly invites pentesters who already have direct access to corporate networks to make contact."If you don't have access,...
Blog

File Integrity Monitoring in 2025: More Than Just a Tripwire

It’s been over a decade that I’ve worked primarily in the world of File Integrity Monitoring and Secure Configuration Management, helping to ensure that hundreds of different companies are able to detect unauthorized or unexpected changes to their configurations.Security has changed a lot over that period, and yet there’s been some surprisingly consistent experiences in the field that I will often...
Blog

What is SNMP? How SNMP Works

SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
Blog

Stop Cyber Threats Before They Cost You: Protecting Financial Services with Fortra

Two in three financial institutions faced cyberattacks in 2024, and that trend shows little sign of letting up. Because of their valuable data – hooked conveniently to direct financial information – FinServ organizations are perennial targets for hungry attackers. But this isn’t news to anybody. Financial institutions understand the threats, and for the most part, they are some of the most...
Blog

What Customers Are Saying About Intermapper

Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.
Blog

What is Web Application Penetration Testing?

These days, it seems like most businesses are dealing with a cybersecurity attack that leaks sensitive information to the public and wreaks havoc on their day-to-day operations. Vulnerability scans are a way to identify areas of weakness within an online security network, but they are not enough. Scanning for web application vulnerabilities in conjunction with penetration testing is a more...