About
Who we are
Who trusts us
Brand
Services
Security advisory-as-a-service
Advanced penetration testing
Smart contract audit
DevOps + automation
Sans Training
Resources
Careers
Blog
Contact
// Blog
Cybersecurity
Cybersecurity
Articles
05.10.2023
VDP vs Bug Bounty: Which Should You Choose?
05.10.2023
What Is a Bug Bounty Program?
01.30.2023
What Is a Vulnerability Disclosure Program (VDP)?
01.17.2023
Best Practices for Protecting Against Account Takeover Attacks
01.10.2023
What Is an APT Attack?
12.13.2022
Why Pen Testing Is Essential For Your Organization’s Security
09.22.2022
What Is Network Segmentation?
09.01.2022
What Is a Random Number Generator Attack?
07.28.2022
Warning: Active MetaMask Phishing Campaign
05.27.2022
What Is NFT Wash Trading?
05.24.2022
What Is a Man-in-the-Middle Attack?
03.24.2022
External vs. Internal Penetration Test: What’s the Difference?
03.01.2022
Application Penetration Testing: What Is It, and How Does It Work?
02.28.2022
Cybersecurity: Why Blue Team Alone Isn't Enough
02.24.2022
Offensive Security: When Attack Is the Best Form of Defense
02.18.2022
What Is Exploit Development?
02.03.2022
What Is Secure Code Scanning?
01.27.2022
Coinbase Phishing Attacks: A Step-By-Step Dissection
01.25.2022
Crypto YouTubers Hacked: What Could Have Happened?
01.13.2022
What Is the Common Vulnerability Scoring System (CVSS) in Cybersecurity?
01.03.2022
What Is Red Teaming, How Does It Work and Why Is It Important?
12.27.2021
Black Box Pen Test vs Gray Box vs White Box: The 3 Penetration Tests
12.09.2021
5 Common Penetration Testing Mistakes
11.02.2021
What Is SSO and Can It Make My Business More Secure?
09.10.2021
What Is Fuzz Testing (Fuzzing)?
09.02.2021
How Safe Is 2FA SMS?
08.24.2021
What Is Phishing: Attack Techniques and Examples
08.23.2021
3 Types of DNS Vulnerabilities and How to Prevent Them
08.17.2021
How To Secure Wireless Devices In Public Settings: As Told by the NSA
07.30.2021
5 Phases of Ethical Hacking
07.21.2021
How to Protect Your Site Against a DDoS Attack
07.16.2021
What Is an Ethical Hacker?
1