Differences Between a Vulnerability Scan and a Penetration Test

Differences Between a Vulnerability Scan and a Penetration Test

Overview Two of the most common questions clients ask are: What’s the difference between a vulnerability scan and penetration test and what option is best for my company? The differences between a vulnerability scan and penetration test are often confused. Let’s take...
Top Pentest Findings in 2022 from a First Year Pentester

Top Pentest Findings in 2022 from a First Year Pentester

The year 2022 has wrapped up and I find it helpful to share some of the most common findings I have encountered throughout the year. Some of these may not be surprising as they are covered in almost every cybersecurity awareness training course there is. However, it...
Getting Started with Prototype Pollution

Getting Started with Prototype Pollution

Prototype pollution allows an attacker to modify the prototype of an object. This means we can potentially assign new properties or methods to an object. Furthermore, we may be able to overwrite existing properties. If you’re unfamiliar with prototypes and...
How to Improve Your External Penetration Testing Results

How to Improve Your External Penetration Testing Results

When on the cusp of receiving an external penetration test, clients want to prepare themselves for it. We often get asked what’s the easiest way to improve their score before the engagement has begun. Below are the top 3 ways to improve your external penetration...
How Open-Source Intelligence Impacts You

How Open-Source Intelligence Impacts You

  OSINT OSINT stands for Open-Source Intelligence. It is the action of gathering information that is publicly available and analyzing it for intelligence purposes.   First, let’s look at what type of data can be considered Open-Source. Data or information...