Blog
Privasec is now a Sekuro Company
Main Menu
- Category
All
Compliance & Standards
Cybersecurity Basics
Event & News
Incident Response & Tabletop Exercises
Our Cybersecurity Solutions
Vulnerability Assessment & Penetration Testing


Blog
A Dummy’s Guide to SOC 2
SOC 2® reporting solves the issue of how a business leader can trust that a service provider is taking its obligations seriously by conducting a SOC 2® Type 1 and Type 2 report to evaluate data protection systems and procedures.
July 13, 2021

Blog
ZenTao CMS – A Monkey’s journey to Priv Esc & Remote Code Execution
This article explores Zentao, understanding how its routing works, and identifying several vulnerabilities that lead to an attack chain that an attacker can execute in order to achieve remote code execution.
July 8, 2021

Blog
Managing Third-Party Risk in 2021
It is always in a company’s best interest to protect itself from vendor risks – before entering, during, and even after the vendor relationship has been established.
July 7, 2021