Blog

 

Posts marked with "cybers"

29.10.2021

What are Vulnerability Assessment, Penetration Testing and Red Teaming?

People do not understand the difference between a Red Team Assessment, a Penetration Testing, and a Vulnerability Assessment. You need to understand what are Your goals and then choose the best suitable assessment. What are differences? Let’s find out!

Keep reading
12.10.2021

API Enumeration with Kite Runner

Heavy portion of interaction with modern web applications is done through APIs. And while there existed numerous tools for conventional web application enumeration, none were designed to target APIs specifically, until Assetnote release KiteRunner.

Keep reading
05.10.2021

CYBERS brings IoT security to RigaComm IoT conference

Conclusion about Nordic-Baltic Security Summit 2021 – The No 1 cyber security event and meeting of minds for the Nordic-Baltic region.

Keep reading
04.10.2021

Conference Summary: Nordic-Baltic Security Summit 2021

Conclusion about Nordic-Baltic Security Summit 2021 – The No 1 cyber security event and meeting of minds for the Nordic-Baltic region.

Keep reading
30.09.2021

New kids on the block: Meet e-CSIRT!

eCSIRT – Emergency Computer Security Incident Response Team is a group of specialists who work on solving these types of problems. They will join forces with your organization and bring skills, knowledge, tools, and experience to the table to solve the incident.

Keep reading
12.07.2021

Server-side Request Forgery – Open door to Your internal services

Server-side request forgery aka SSRF, is a vulnerability that enables an attacker to use a vulnerable server as a proxy to make HTTP requests on behalf of the attacker. SSRF are regularly used to target internal services that are behind firewall and not exposed to the public directly.

Keep reading