Red Team Assessment Phases: Completing Objectives

| | Penetration Testing
The purpose of this phase of the assessment is fairly self-explanatory. In previous phases, the red team performed the operations necessary to set themselves up for success in achieving the goals of ...
The Year Ahead: Cybersecurity Trends To Look Out for In 2019

The Year Ahead: Cybersecurity Trends To Look Out for In 2019

A Proven Record Tracking Cybersecurity Trends This time of the year is always exciting for us, as we get to take a step back, analyze how we did throughout the year, and ...
Office 365 Phishing Attack Using Fake Non-Delivery Notifications

Office 365 Phishing Attack Using Fake Non-Delivery Notifications

A new phishing attack is using fake non-delivery notifications in an attempt to steal users’ Microsoft Office 365 credentials. SANS ISC Handler Xavier Mertens discovered the attack while reviewing data captured by ...
Lampião 1: CTF Walkthrough

Lampião 1: CTF Walkthrough

| | Penetration Testing
In this article, we will learn to solve a Capture the Flag (CTF) challenge which was posted on VulnHub by Tiago Tavares. According to the information given in the description by the ...
It’s past time to pay much more attention to API security

It’s past time to pay much more attention to API security

Organizations manage 363 APIs, on average. But vulnerable APIs can expose your data to anyone who knows how to ask for it. API security starts with the basics. The original version of ...

Red Team Assessment Phases: Establishing Foothold and Maintaining Presence

| | Penetration Testing
In the previous phase, the goal was to gain initial access to the target network. The focus of this phase is to expand this access to the level necessary for achieving the ...
Read: New Attack Analytics Dashboard Streamlines Security Investigations

Read: New Attack Analytics Dashboard Streamlines Security Investigations

Attack Analytics, launched this May, aimed to crush the maddening pace of alerts that security teams were receiving. For security analysts unable to triage this avalanche of alerts, Attack Analytics condenses thousands ...
Twelve Days of XSSmas

Twelve Days of XSSmas

This series of daily mini-posts, running from December 12, 2018 to December 24, 2018, is intended to provide cross-site scripting (XSS) related tips. This will range from filter-evasion and payload minification tricks, ...
2018 In Review: Healthcare Under Attack

2018 In Review: Healthcare Under Attack

Radware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and analyze attack patterns to gain further insight into today’s ...
Loading...