Pentera Team
10 articles by this writer

Assessing Your Attack Surface from an Attacker’s Perspective

In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams w...

Identifying and Mitigating the PwnKit Vulnerability

While it may seem like the right course of action is to stop everything and immediately start patching the recent PwnKit vulnerability, this probabl...

Understanding Ransomware Insider Threats

The trope of the burglar comparison in cybersecurity is more than overused. But when we talk about the damage of a break-in, it’s not just picking t...

Exploring the PrintNightmare Vulnerability

Greenpeace recently took credit for the PrintNightmare exploitation. Warning that if the world does not shift to paperless immediately, further deva...

Understanding Top Exploited Vulnerabilities

There are patches or remediations for all the top vulnerabilities, but they’re still being exploited in the wild. Why is that? Well, if you were the...

Must-Have Features for Security Validation Tools

With an expanded remote workforce and a rise in cyber-attacks over the past year, validating organizational resilience is top of the enterprise agen...

Key Lessons from the Top 5 Cyber Attacks of 2020

Remote working is often cited as one of the top reasons for the rise in cyber-crime in 2020, but it’s far from the only growing challenge for today’...

Cybersecurity Highlights of 2020

The Greatest Hits of 2020 Who doesn’t love some good old nostalgia? Ok, it’s true, many of us are glad to see the back of 2020. But as we sta...