BAS and Red Teams Will Kill The Pentest

BAS and Red Teams Will Kill The Pentest

With our research on testing security methods and Breach and Attack Simulation tools (BAS), we ended up with an interesting discussion about the role of the pentest. I think we can risk saying that pentesting, as it is today, will cease to exist (I’ll avoid the trap to say “pentesting is dead”, ok? :-)). Let […]

How to Set Up a Web App Pentesting Lab in 4 Easy Steps

How to Set Up a Web App Pentesting Lab in 4 Easy Steps

A pentesting lab can be a small entity used by one security tester, consisting of one or two computers; or it could be a larger set of networked computers behind a closed or secured network, used by a group of security testers. Step 1: Assess Pentesting Needs Before creating a pentesting lab, it is important […]

Pentest Tools and News

Pentest Tools and News

BYOB – Build Your Own Botnet , , , , , post exploitation, , , , Disclaimer: This project should be used for authorized testing or educational purposes only. BYOB is an open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of […]

FDA Beefs Up Cyber Security Measures To Protect Patients

FDA Beefs Up Cyber Security Measures To Protect Patients

FDA To Strengthen Cyber Security Program For Medical Devices Most of us own computers and cell phones, and as such, have been threatened with viruses, malware and other attacks. In the past, hackers have raged war on individuals as well as large corporations such as government agencies, movie studios and banks. Now, healthcare entities are […]

What are the most common cyber attack?

What are the most common cyber attack?

Cyber crime is at an all-time high, and at the same time as organizations are trying to counter these attacks, criminal hackers are becoming more innovative with the different types of cyber attacks they are choosing to deploy. What is a cyber attack? Cyber attacks are deliberate and malicious. They are attempts to breach the information or information systems of individuals or organizations. The following list points out the six most […]

Government would provide funding to address cyber security – President

Government would provide funding to address cyber security – President

Accra, Oct. 22, GNA – President Nana Addo Dankwa Akufo-Addo on Monday assured that government would provide the funding for the critical infrastructure needed to ensure Ghana’s cyber security, to protect the people, the economy and the country’s national security. Furthermore, as part of efforts to secure Ghana’s cyber space, government, he said, was to […]

The First Critical Steps After a Cyber Attack

The First Critical Steps After a Cyber Attack

Critical Steps After a Cyber Attack As they say, prevention is better than cure. But what if prevention just wasn’t good enough? Here are the first critical steps to take after a cyber attack. This is almost four times the cost of breaches in 2015. While large retailers, banks, and federal headlines draw massive attention […]

Bawumia Launches Cyber Security Initiative

Bawumia Launches Cyber Security Initiative

Vice President Dr. Mahamudu Bawumia Government is concerned about the increasing rate of cyber crimes across the globe. Vice President Dr Mahamudu Bawumia, who made this known, expressed worry about how security breaches have gained notoriety, with the capacity to endanger global economy increasingly linked through digitalization. He reiterated government’s determination to stay ahead of […]

Your Business Has Recovered from a Cyber Attack. Now What?

Your Business Has Recovered from a Cyber Attack. Now What?

If your business has been the victim of some sort of IT security breach, you’re definitely not alone. But believe it or not, what you do next might make your company stand out. It should be obvious (especially if you’ve been working with ATB for any period of time) that if you’ve experienced a cyber […]