Risk-Based Authentication is a form of strong authentication that calculates a risk score for any given access attempt in real time, based on a predefined set of rules. Users are then presented with a..
Pretty much everywhere you go today, there is a WiFi network you can connect to. Whether it be at home, at the office or at the local coffee shop. Every WiFi network is setup with some kind of network..
The second phase of a red team assessment is reconnaissance. In this phase, the red team attempts to collect information relevant to the assessment while keeping as low of a profile as possible. In or..
In this article we will help you understand what is GDPR, and more specifically, how GDPR relates to security and penetration testing...
Penetration tests are a great way to detect holes in your security defenses. With the help of security experts you can identify vulnerabilities and learn what actions to take to protect your business ..
When it comes to how dangerous a cyber attack is, the answer is potentially devastating, Penetration testing is an everyday part of the job description for us here at Scorpiones. In fact, it’s our sp..
Security researchers have discovered several serious vulnerabilities in the WPA3 that could allow attackers to recover the password of the Wi-Fi network using downgrade attacks or side-channel leaks. ..
Penetration testing versus red teaming. We often hear them used together, but in fact, they’re two different things. So, what exactly is the difference between the terms between penetration testing an..
DNS rebinding is a class of exploit in which the attacker initiates repeated DNS queries to a domain under their control, while the first query would return a valid response that passes security check..