Latest News

Privasec’s Senior Penetration Tester, Sajeeb Lohani was invited to That Security Podcast last week. Sajeeb discussed his passion for finding vulnerabilities in bug bounty infrastructure and shared his views on the Bug Bounty industry and its success stories. Like Sajeeb, Privasec Red Consultants have years of experience in providing security services that test the technical security measures in place within the client’s infrastructure and applications, searching for weaknesses within. Email This email address is being protected from spambots. You need JavaScript enabled to view it. to engage with one of our Red Team experts. 

Check out the full episode here:

Privasec RED logo

With the ever-evolving cyber attacks, it is important to protect your business from financially motivated hackers. The most effective way to secure your online presence by paying hackers to attack you (penetration testing). There are 3 most common penetration testing approaches: 

  • Black Box: Black BoxPerformed without any prior knowledge and access to the environment, like if you were attacked by an offshore hacker.
  • White Box: White BoxYour Consultant has initial access to the environment. This saves you time by skipping the initial defense layer which we would most likely breakthrough.
  • Grey Box: Grey BoxA hybrid type of black and white box testing, providing a good balance between effort and comprehensiveness. 

Privasec Red team offers a range of services including but not limited to web application, infrastructure, wireless, mobile penetration testing. Our consultants can add physical penetration testing to our cyber tests, to provide end-to-end assurance against targeted attacks and corporate espionage. Check our Privasec Red Website to know more about the services we offer: and

Call T(AU): 1800 996 001, T(NZ): 222 4725, T(SG): 6631 8375 or email This email address is being protected from spambots. You need JavaScript enabled to view it. to book an appointment with one of our experienced Red consultants to discuss your company’s cyber-security priorities and discover how we can help.