by Andrew Nash | Aug 3, 2022 | cybersecurity, penetration testing, Uncategorized
“Hacking” isn’t magic, but sometimes it is presented that way. Much of penetration testing and “hacking” is learning the tools of the trade and how they work “under the hood.” In this series we hope to provide a high-level overview of common...
by Kevin Thomas | Jun 17, 2022 | cybersecurity, incident response
The most recent Cost of a Data Breach Report (Ponemon 2021) found that “Lost Business Cost” represented the largest percentage (38%, or $1.59M) of the $4.2M average cost of a data breach. One of the key contributors to the “Lost Business Cost”, along with the cost of...
by Joshua Jones | Mar 5, 2020 | Uncategorized
Kali linux has undergone many changes over the past year. With a new UI, transitioning to python3, and a host of new tools, 2019 was a big year for the Kali Linux team. Now, after some telling blog posts, the Kali team has made even more changes to the distribution...
by Slade Griffin | Feb 19, 2020 | Uncategorized
Recently, Tim Tomes (@LaNMaSteR53 on Twitter) made a huge update to his recon-ng program. I am grateful for his hard work, dedication, and generosity as he serves the infosec community and provides such a wonderful free tool. The new update changed a lot of the syntax...
Recent Comments