Vulnerability Assessment & Penetration Testing

Featured Case Study: Xiao Mi ISO Certifications with Privasec

As a leading consumer electronics company, Xiao Mi recognised the significance of upholding robust information security and privacy standards, especially amidst the evolving landscape of industry certifications. This case study delves into Xiao Mi’s journey towards meeting stringent data compliance requirements for its international user base, facilitated by Privasec.

Featured Case Study: Xiao Mi ISO Certifications with Privasec Read More »

External Perimeter Penetration Testing | Examining Threats Targeting Your Business’s External Perimeter

In the age of digital transformation, the concept of perimeter security has undergone an evolution. Traditionally likened to the protective walls of a medieval castle, perimeter security relied on physical barriers like firewalls to ward off attackers. However, the digital revolution has rendered these boundaries porous, challenging organisations to redefine their defence strategies. Enter Open-Source

External Perimeter Penetration Testing | Examining Threats Targeting Your Business’s External Perimeter Read More »

Level Up Your Security | Choosing the Right Assessment for Your Needs

Confused about security assessments? We break down the differences between External Network Penetration Testing, External Perimeter Penetration Testing, and Red Teaming to help you choose the best defense for your critical infrastructure. Click to learn more!

Level Up Your Security | Choosing the Right Assessment for Your Needs Read More »

From Clicks to Clues | Following the Digital Breadcrumbs with OSINT

Failing to identify potential risks leaves organisations exposed to cyberattacks. In this blog post, we embark on a journey from clicks to clues, exploring the profound realm of Open-Source Investigation (OSINT) techniques and their pivotal role in modern organisational security. Read more!

From Clicks to Clues | Following the Digital Breadcrumbs with OSINT Read More »

External Perimeter Penetration Testing | Unleashing OSINT to Discover Hidden Entry Points

In today’s interconnected world, security is not just about fortifying the castle walls. It’s about understanding the invisible landscape that surrounds them. With External Perimeter Penetration Testing (EPPT), organisations can gain a deeper understanding of their external attack surface and take proactive steps to secure their ever-expanding digital footprint. Find out more!

External Perimeter Penetration Testing | Unleashing OSINT to Discover Hidden Entry Points Read More »

what-is-PT-landscape-privasec

Understanding Penetration Testing: What Is It & the Types

In the ever-evolving landscape of cybersecurity, staying one step ahead of potential threats is paramount for businesses. Penetration testing stands as a robust strategy to fortify digital defences, safeguard sensitive information, and ensure the resilience of an organisation’s systems. As companies in Singapore and beyond seek to bolster their security measures, the importance of conducting

Understanding Penetration Testing: What Is It & the Types Read More »

three-locks-and-a-chain

What happens during a Red Team Attack Simulation?

Red Team Attack Simulations mimic an adversary attacking your organisation. Red Team Attack Simulations enable you to understand and improve upon your ability to identify and respond to an adversary tyring to access your systems or information.But what actually happens during a Red Team and how does an Attack Simulation work in practise?

What happens during a Red Team Attack Simulation? Read More »

CVE-2020-3977: VMware Horizon DaaS Broken Authentication (MFA Bypass)

Not long ago, I assisted a client of ours with a penetration test of their VMware Horizon remote access solution and discovered a vulnerability affecting how it handles Multi-Factor Authentication (MFA). As a result, with a compromised user account password, I could gain access to the organisations internal network from the internet, bypassing the MFA

CVE-2020-3977: VMware Horizon DaaS Broken Authentication (MFA Bypass) Read More »

Scroll to Top