pentest & certification

CREST, OSCP, CEH… Should you require certifications from your pentest providers? To select a pentest provider, security certifications are obviously useful although they cannot be the only way to assess the value of a service and the skill level of pentesters. There are other aspects that should be considered too. Another related topic is the recognition of the pentest value and the certificates that you may be able to show to your customers.

Pentest or Bug Bounty

Bug bounty signs the end of pentests’ ‘Bug bounty, the death of the traditional penetration test’… Do you remember these article headlines? Today we see that this is not the case and that both approaches continue to exist.

Both services address the same initial need: to test a company’s web applications and infrastructure with realistic attacks. What are the differences between the two approaches? How do you choose between a bug bounty and a penetration test?

We present you nine main criteria to consider.

Corporate data dark web

From a cybersecurity point of view, the dark web is like a huge marketplace where sensitive data (personal data, bank details, email addresses, credentials, etc.) are found alongside kits for carrying out cyber-attacks. Indeed, 15 billion credentials are currently in circulation [1], and it is reportedly possible to buy malware for between $50 and $5000 [2].

Why does business data end up on the dark web? And how to identify possible data leaks? Before we get to the heart of the matter, let’s clarify a few things about the concepts of deep web, dark web and dark net.

The network infrastructure is at the core of business operations in most industries. It can be considered the nerve centre of the entire IT organisation because it centralises data, simplifies data exchange and facilitates communication between employees.

How to Strengthen the Security of Your Network Infrastructure to counter the Most Common Attacks?

It is therefore an essential tool for the smooth running of organisations, which requires constant attention in terms of security in order to protect yourself against increasingly numerous and sophisticated external and internal attacks.

How to Strengthen the Security of Your Web Applications to Counter the Most Common Attacks?

Most web applications manipulate personal and/or business data, in other words, sensitive data. Passwords, email addresses, credit card numbers, health data and others are at the centre of the battle between two opposing sides. On one side, companies, whether small, medium or large, seeking to defend themselves against intrusions into their information systems, and on the other, increasingly experienced attackers, attracted by the lure of gain and stimulated by the many breaches too often ignored by their future victims.

9 Misconceptions about Web and Mobile Applications Security

Web and mobile applications are at the core of most companies’ activities. Whether you’ve already deployed them or that they are still under development, some misconceptions about their security are still present, even though it is a crucial topic to conduct your business in good conditions. 

Here are the 9 preconceived ideas that we most often encountered.

WordPress, Joomla, Drupal, Shopify and many more, offer real possibilities for creating sites that are both ergonomic and efficient. However, a negative image is still associated with CMS websites: they would be insecure and easy targets for malicious hackers.

CMS and security

What are the risks of cyberattacks on these sites? What specific elements of CMS are to be monitored?

If you are in charge of a CMS platform, this article will help you to identify the main risks and will provide you with points of vigilance to reinforce the level of security.

Do you know why phishing is so dangerous?

Because it combines IT skills with knowledge of human psychology. In fact, a phishing email relies on human psychological drivers to first get the opening of the email and to then push to click.

Technical skills are of course necessary to increase the likelihood of clicks, e.g. to spoof a legitimate sender, to create an interface clone, to forward to malicious domains, etc.

But today, we will look into the psychological drivers that drive action during phishing. We have taken 8 commonly used drivers and associated them with different subjects that can be used as pretexts for phishing.