by Andrew Nash | Aug 3, 2022 | cybersecurity, penetration testing, Uncategorized
“Hacking” isn’t magic, but sometimes it is presented that way. Much of penetration testing and “hacking” is learning the tools of the trade and how they work “under the hood.” In this series we hope to provide a high-level overview of common...
by Kevin Thomas | Jul 20, 2020 | Uncategorized
We look forward to announcing the topic and date for the Q3 2020 Infosec Quarterly Quorum (IQ2) soon. As always the focus of our IQ2’s is to present and discuss current events and trends in the realm of information security and compliance. The presentations are...
by Kevin Thomas | Jul 16, 2020 | Uncategorized
Is your organization required to have an Annual Penetration Test? Are you currently evaluating vendors or want to know more about the Contextual Security Solutions approach? If so, reach out to our team today for a copy of the “What’s in the Pen...
by Slade Griffin | Mar 5, 2020 | Uncategorized
What are you talking about? The PMK caching vulnerability was discovered in 2018 and has now been incorporated into most wireless auditing and testing techniques that we perform. So, what is this new thing? The technical aspect resides in the IEEE 802.11 I[1]...
by Joshua Jones | Mar 5, 2020 | Uncategorized
Kali linux has undergone many changes over the past year. With a new UI, transitioning to python3, and a host of new tools, 2019 was a big year for the Kali Linux team. Now, after some telling blog posts, the Kali team has made even more changes to the distribution...
Recent Comments