Background Information MINDEF, the Ministry of Defence of the nation (Malaysia), located in the Asia Pacific region, is responsible for executing government defense policy, with the main goals of protecting the country and its interests and enhancing global peace and stability. To upgrade the nation’s military defense against cyber warfare and provide top-grade vulnerability management,
Attack surface management (ASM) this few years is gaining momentum, as it provides a fresh new approach to security from the attacker’s perspective. As the market starts to realise reducing attack vectors is not practical to cope with modern challenges. In the IT field, it is very common for a couple of years to change
We do not use the word war, and use conflict instead. Since it one sided war attempt with political consideration and planned campaign. Without an hour, Ukraine all the military facilities and force is wideout, as you can see in the various news. War does not have right or wrong, for the one who provokes
In conjunction with the E-SPIN 16th anniversary celebration, E-SPIN pleased to organize a seminar event focused on the cyber kill chain mythology and how it applies to red team operations process and framework. This event focuses on methodology, framework and processes, and at a high level dimension, regardless of whatever penetration testing and red team
Cobalt Strike is an operating system for Adversary Simulations and Red Team Operations. Adversary Simulations and Red Team Operations are security appraisal that clone the tactics and capability of an advanced adversary in a network. In the same moment, penetration tests focus on un-patched vulnerabilities and mis configurations, these assessments benefit security operations and incident
US Biden government is just hiring senior public sector professionals for the national cyber warfare unit leadership roles. It seems as the response for reacting to the recent major massive incident of Solarwinds being hacked, and using its software update to compromise a range of the customers that are being reported and under investigation right
Scan across all the news, FireEye Hacked incident is something worth to highlight and more importantly what the lesson we can learn from it. Let get real, being cyberthreat hunter, but you are being hacked, that is the result, what really matter is actually what is going on, a company suppose possess global capability to
Penetration testing (Pentesting) is not quite the same as vulnerability scanning. A vulnerability scan is utilized to recognize, rank, and report vulnerabilities while a penetration test is utilized to misuse vulnerabilities or in any case rout the security controls and highlights of a system. Penetration testing is an approved and proactive exertion to evaluate the
Penetration tests differ both in their approaches and in the weaknesses they attempt to exploit. The level of information provided to the pen tester will determine their approaches as well as the scope of the project. The different approaches to penetration testing in generic include: White Box Black Box Gray Box Black Box Penetration Testing
Penetration testing, also called pen testing or ethical hacking, is the act of testing a PC system, network, system, wireless network or web application to discover security vulnerabilities that an attacker could abuse. Penetration testing can be automated with software applications or performed manually. In any case, the procedure includes gathering data about the objective
- 1
- 2