Contextual Security
  • About Us
    • Our Team
    • Careers
  • Services
    • BASE (Base Assessment of Security Elements)
    • Penetration Testing
    • PCI Compliance
    • Cybersecurity Maturity Model Certification (CMMC)
    • HIPAA Risk Assessment
    • General Data Protection Regulation
    • CIS Top 20
    • SecurityXtension
    • Rogue Access Point (AP)
    • HITRUST
    • Types of Pen Testing
  • Specialty Industries
    • Retail
    • Healthcare
    • Power
    • Finance
  • Blog
  • Contact Us
  • (844)-526-6732
  • Let’s Chat
Select Page

A Recon-NG Update Primer

by Slade Griffin | Feb 19, 2020 | Uncategorized

Recently, Tim Tomes (@LaNMaSteR53 on Twitter) made a huge update to his recon-ng program. I am grateful for his hard work, dedication, and generosity as he serves the infosec community and provides such a wonderful free tool. The new update changed a lot of the syntax...

Recent Posts

  • Breach-Parse Basics
  • PCI DSS 3.2.1 to 4.0 Control Changes – Requirement 3
  • Responder – The Tool That Won’t Die
  • PCI DSS 3.2.1 to 4.0 Control Changes – Requirement 2
  • PCI DSS 3.2.1 to 4.0 Control Changes

Recent Comments

    Archives

    • May 2023
    • April 2023
    • February 2023
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • March 2022
    • December 2021
    • November 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • April 2020
    • March 2020
    • February 2020

    Categories

    • Compliance
    • cybersecurity
    • incident response
    • PCI DSS 4.0
    • penetration testing
    • Uncategorized
    • whitelisting

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Breach-Parse Basics

    by Terence Martin | May 16, 2023 | Compliance, cybersecurity, penetration testing

    Open source intelligence gathering, or OSINT, can be a threat to organizations because it can be used to gather information about their employees, assets, and vulnerabilities. This information can then be used to launch targeted scanning against discovered...

    PCI DSS 3.2.1 to 4.0 Control Changes – Requirement 3

    by Joshua Jones | Apr 18, 2023 | Compliance, cybersecurity, PCI DSS 4.0

    Today, let’s look at some changes made to Requirement 3 for PCI DSS 4.0. I am also adding “Why does this matter?” sections at the end of each control change to hopefully shed light on why it's important. Requirement 3 Changes In Requirement 3, we will find an...

    Responder – The Tool That Won’t Die

    by Andrew Nash | Apr 4, 2023 | Compliance, cybersecurity, penetration testing

    Overview One of the most common findings we make at Contextual Security Solutions during internal penetration tests is the presence of vulnerable network protocols, like Link-local Multicast Name Resolution (LLMNR), Web Proxy Auto-Discovery (WPAD)...

    « Older Entries

    Contextual Security
    5100 Poplar Avenue, 27th Floor
    Memphis, TN 38137
    844-526-6732
    [email protected]

    Let’s have a chat. We will call you right back!

    10 + 3 =

    Solid security begins with knowing. Excels by doing.

    • Home
    • Services
    • Industries
    • SecurityXtension
    • Resources
    • Contact Us
    • (844) 526-6732

    copyright 2020 | Contextual Security

    • Follow
    • Follow