About Cybersecurity Research

Stay at the forefront of cybersecurity with cutting-edge research and insights.

Explore the latest trends, threats, and innovations shaping the cyber landscape.

Book your demo now >
security research techniques

Security Research Techniques: Build Before You Break

I've been in security research for quite a while now, so I've had more than a few opportunities to guide researchers during their security research en...
Blurring Boundaries: Risks of AWS SSM in Hybrid Landscapes

Deciphering the Risks of AWS SSM in Hybrid Environments

Introduction  Hybrid cloud environments are becoming the backbone of enterprise IT infrastructure, offering unparalleled scalability and flexibilit...

Forti-fied? Logging blind spot revealed in FortiClient VPN

Virtual private networks (VPNs) have become widely used by enterprises for secure remote network access to protect sensitive data. This critical role ...

Two New Zero-Day Vulnerabilities Uncovered in FortiClient VPN

Introduction Our latest research from Pentera Labs uncovers high-severity Fortinet vulnerability CVE-2024-47574, exposing risks in FortiClient's use ...

How Attackers Can Achieve a DoS Attack in Microsoft Active Directory

In this blog, we explore how attackers can exploit a limitation in Active Directory (AD) Security Identifiers (SIDs) to lock users out of the domain w...

Return of the RCE: Addressing the regreSSHion Vulnerability – CVE-2024-6387

A Regrettable Resurgence On July 1, 2024, the Qualys Threat Research Unit (TRU) published their discovery of an unauthenticated remote code executio...

Pentera’s 2024 Report Highlights the Criticality of Continuous Validation

Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half....

How to attack and protect WebLogic server

WebLogic is a popular enterprise middleware tool that orchestrates the interaction between backend systems and frontend clients. This makes it a val...
Begin your security validation journey
Request a demo