Penetration testing stories
DDLS joins the Offensive Security Global Partner programme
DDLS will provide OffSec training products in A/NZ, including penetration testing, cloud security, web application, exploit development and security operations.
Ethical hacking in Aotearoa: How can it benefit cybersecurity in NZ?
Negative connotations have traditionally been applied to the term 'hacking'. But with cyber-threats ramping up, things are changing fast — and CISOs can't afford to keep the status quo.
Interview: Blacklock Security pioneers pentesting as a service in Asia Pacific
We spoke to Blacklock's Nilesh Kapoor about Blacklock, a startup that is making waves in the penetration testing as a service space.
Huge increase in threat actors using Cobalt Strike - Proofpoint research
Proofpoint cybersecurity company has released research finding a 161% increase in threat actors using the threat emulation tool Cobalt Strike.
HackerOne launches penetration testing to empower digital transformation
“In today’s agile environments, pentest platforms should seamlessly integrate with every aspect of the software development lifecycle so that findings are quickly pushed to the right developer and vulnerabilities are fixed faster."
Equifax breach vulnerability surfaces as top network attack in Q3 2019
WatchGuard’s latest Internet Security Report also reveals significant increases in malware and network attacks, as zero day malware accounts for 50% of all detections.
Trustwave introduces dashboard to manage security testing
Through point-and-click navigation, users can scan business-critical applications to search for unpatched vulnerabilities, exploitable code or evidence of malicious activity.
Orca Tech onboards auto penetration testing company
The cybersecurity and analytics VAD has formed an agreement with the Israeli company Pcysys.
Security defensive blue teams failing to catch offensive red teams - Exabeam
35% of respondents claim that the blue team never or rarely catches the red team, while 62% say they are caught occasionally or often.
Cylance report looks into questionable pentesting practices
The report demonstrates how the line distinguishing pentesting exercises from actual threat actor behaviour has thinned.
Search and destroy: Secure your web apps with zero false-positives
ImmuniWeb On-Demand is a perfect choice for one- time application security and privacy testing.
Trustwave releases facial recognition tool for pentesters
Social Mapper takes an automated approach to searching popular social media sites for names and pictures of individuals.
Singapore IMDA launches GoSecure cybersecurity programme for Singapore ICT firms
According to IMDA, the programme will benefit 200 Singapore-based ICT companies over the two-year period.
Brisbane cybersecurity startup protects $1 billion worth of ICO funding from hackers
Entersoft’s ‘one stop shop’ approach to cybersecurity has paid off to the tune of $1 billion worth of initial coin offerings.
What cyber security needs to go beyond the network
Forward thinking companies are going beyond penetration testing to employ a more holistic approach to cyber security.
APAC to be the fastest-growing region for security assessment services
Asia Pacific will be a hotspot for security assessment vendors as it becomes the fastest growing region in the world between 2017-2022.
In depth: A lawyer's perspective on ethical hacking & penetration testing in Asia
What is‘ethical hacking’ in an organisation and are there any grey areas in the law? We sat down with RHTLaw Taylor Wessing’s Jack Ow to find out.
Interview: Sense of Security talks red teaming, DevSecOps and 'box ticking'
"In some cases, we’ve simply walked in and plugged a device straight into the network with little to no resistance."
RIoT Solutions ramps up security capabilities to match business growth
“The move to smart, connected networks puts us in a strong position to grow our business as demand for secure IoT connectivity increases."
Equifax breach indicates need to evolve cyber security thinking
The Equifax breach has underlined the problem with security testing.
The legal impact of data protection and management in the digital age
As organisations look towards data to track patterns, they should also be mindful of the legal regulations that govern data protection and breaches.
Identity theft - have you ever pen tested procedures?
There is a focus on technical aspects of penetration tests, network and application security, while the chain is only as strong as its weakest link.
RIoT Solutions security team snaps up 'gruelling' OSCP certification
RIoT Solutions’ security team has proven that its up to scratch in their cyber expertise, after three of its top experts gained OSCP Certification.