...

Privasec RED

Demystifying Workshop

Demystifying Two Different Worlds: A Look into ISO 27001 and Red Teaming

Red Team Attack Simulations mimic an adversary attacking your organisation. Red Team Attack Simulations enable you to understand and improve upon your ability to identify and respond to an adversary tyring to access your systems or information.

But what actually happens during a Red Team and how does an Attack Simulation work in practise?

Demystifying Two Different Worlds: A Look into ISO 27001 and Red Teaming Read More »

three-locks-and-a-chain

What happens during a Red Team Attack Simulation?

Red Team Attack Simulations mimic an adversary attacking your organisation. Red Team Attack Simulations enable you to understand and improve upon your ability to identify and respond to an adversary tyring to access your systems or information.But what actually happens during a Red Team and how does an Attack Simulation work in practise?

What happens during a Red Team Attack Simulation? Read More »

CVE-2020-3977: VMware Horizon DaaS Broken Authentication (MFA Bypass)

Not long ago, I assisted a client of ours with a penetration test of their VMware Horizon remote access solution and discovered a vulnerability affecting how it handles Multi-Factor Authentication (MFA). As a result, with a compromised user account password, I could gain access to the organisations internal network from the internet, bypassing the MFA

CVE-2020-3977: VMware Horizon DaaS Broken Authentication (MFA Bypass) Read More »

Scroll to Top
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.