by Terence Martin | May 16, 2023 | Compliance, cybersecurity, penetration testing
Open source intelligence gathering, or OSINT, can be a threat to organizations because it can be used to gather information about their employees, assets, and vulnerabilities. This information can then be used to launch targeted scanning against discovered...
by Andrew Nash | Apr 4, 2023 | Compliance, cybersecurity, penetration testing
Overview One of the most common findings we make at Contextual Security Solutions during internal penetration tests is the presence of vulnerable network protocols, like Link-local Multicast Name Resolution (LLMNR), Web Proxy Auto-Discovery (WPAD)...
by Andrew Nash | Aug 3, 2022 | cybersecurity, penetration testing, Uncategorized
“Hacking” isn’t magic, but sometimes it is presented that way. Much of penetration testing and “hacking” is learning the tools of the trade and how they work “under the hood.” In this series we hope to provide a high-level overview of common...
by Kevin Thomas | Jun 17, 2022 | cybersecurity, incident response
The most recent Cost of a Data Breach Report (Ponemon 2021) found that “Lost Business Cost” represented the largest percentage (38%, or $1.59M) of the $4.2M average cost of a data breach. One of the key contributors to the “Lost Business Cost”, along with the cost of...
by Joshua Jones | Mar 5, 2020 | Uncategorized
Kali linux has undergone many changes over the past year. With a new UI, transitioning to python3, and a host of new tools, 2019 was a big year for the Kali Linux team. Now, after some telling blog posts, the Kali team has made even more changes to the distribution...
Recent Comments