Contextual Security
  • About Us
    • Our Team
    • Careers
  • Services
    • BASE (Base Assessment of Security Elements)
    • Penetration Testing
    • PCI Compliance
    • Cybersecurity Maturity Model Certification (CMMC)
    • HIPAA Risk Assessment
    • General Data Protection Regulation
    • CIS Top 20
    • SecurityXtension
    • Rogue Access Point (AP)
    • HITRUST
    • Types of Pen Testing
  • Specialty Industries
    • Retail
    • Healthcare
    • Power
    • Finance
  • Blog
  • Contact Us
  • (844)-526-6732
  • Let’s Chat
Select Page

PMKID Wireless Vulnerability Proof of Concept

by Slade Griffin | Mar 5, 2020 | Uncategorized

What are you talking about? The PMK caching vulnerability was discovered in 2018 and has now been incorporated into most wireless auditing and testing techniques that we perform. So, what is this new thing? The technical aspect resides in the IEEE 802.11 I[1]...

Recent Posts

  • The Need for Incident Response Playbooks
  • 0-Day
  • False Positives / What Are They Doing Here?
  • Visibility and “Actionable” Metrics / #ExpectMore Series
  • Security Assessments & Security Debt / #ExpectMore Series

Recent Comments

    Archives

    • June 2022
    • March 2022
    • December 2021
    • November 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • April 2020
    • March 2020
    • February 2020

    Categories

    • cybersecurity
    • incident response
    • penetration testing
    • Uncategorized
    • whitelisting

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    The Need for Incident Response Playbooks

    by Kevin Thomas | Jun 17, 2022 | cybersecurity, incident response

    The most recent Cost of a Data Breach Report (Ponemon 2021) found that “Lost Business Cost” represented the largest percentage (38%, or $1.59M) of the $4.2M average cost of a data breach. One of the key contributors to the “Lost Business Cost”, along with the cost of...

    0-Day

    by Slade Griffin | Jun 3, 2022 | Uncategorized

    What are we talking about? On May 30 CVE 2022-30190, https://nvd.nist.gov/vuln/detail/CVE-2022-30190, was issued by Microsoft. According to the Common Vulnerability Scoring System this is currently ranked as a high-severity vulnerability with a 7.8 out of 10. A...

    False Positives / What Are They Doing Here?

    by Slade Griffin | Mar 10, 2022 | Uncategorized

    False positives can be difficult to disprove and even harder to understand. They stem from an automated product, like a vulnerability scanner, doing its best to determine whether a specific condition exists or not. Unfortunately, a lot of people end up trying to...

    « Older Entries

    Contextual Security
    5100 Poplar Avenue, 27th Floor
    Memphis, TN 38137
    844-526-6732
    info@contextualsecurity.com

    Let’s have a chat. We will call you right back!

    7 + 13 =

    Solid security begins with knowing. Excels by doing.

    • Home
    • Services
    • Industries
    • SecurityXtension
    • Resources
    • Contact Us
    • (844) 526-6732

    copyright 2020 | Contextual Security

    • Follow
    • Follow