Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

Blog
Cyber in the Board Room: From Security Findings to Business Action
Learn more
Blog
How to Win Cybersecurity Budget Approval with Continuous Validation
Learn more
1 / 3
Security Validation ROI: Justifying Cyber Investments
Pentera Team
26 Mar 2025
In a recent feature on The Hacker News, Shawn Baird, Associate Director of Offensive Security & Red Teaming at DTCC, shared how he successfully communicated the Security Validation ROI to senior management and secured funding for an automated security testing platform. As security budgets expand, organizations are under increasing pressure...
Read more
CVE-2024-47176 – Linux Privilege Escalation via CUPS Vulnerability
Pentera Team
26 Feb 2025
A privilege escalation vulnerability in the Common UNIX Printing System (CUPS) affects the cups-browsed service, a helper for the main CUPS service. Attackers can exploit this flaw by crafting malicious packets targeting the exposed cups-browsed service on port 631/UDP. This can trigger the service to connect back to the attacker,...
Read more
Deciphering the Risks of AWS SSM in Hybrid Environments
Pentera Team
06 Jan 2025
In our latest research, we explore how AWS SSM, a tool designed for streamlined host administration, can be exploited by attackers.
Read more
Ransomware Insider Threats: Understanding the Growing Danger
Assaf Regev
02 Jan 2025
Insider-enabled ransomware is dangerous because it weaponizes legitimate access and bypasses traditional defenses. Organizations need continuous validation to know whether their controls can actually stop ransomware from within. Resilience comes from testing often, fixing gaps fast, and treating ransomware readiness as an ongoing practice.
Read more
From Compliance to Confidence: Achieving CMMC 2.0 Certification
Jason Mar-Tang
24 Dec 2024
CMMC is about proving security, not just documenting it. Many contractors struggle to show their controls work in practice. Continuous validation helps close that gap.
Read more
Continuous Ransomware Validation: Why Annual Testing Is No Longer Enough
Jason Mar-Tang
17 Dec 2024
RaaS has made ransomware faster to launch, harder to predict, and far more scalable for attackers. That means organizations can’t rely on annual testing or backups alone. Continuous validation is what turns ransomware readiness into something real.
Read more
What is BAS 2.0 and Why You Need It
Michal Brenner
03 Dec 2024
Traditional BAS validates expected scenarios, but modern attackers do not follow playbooks. BAS 2.0 closes that gap by continuously emulating real attack behavior across the environment and prioritizing exposures based on actual impact. That shift gives security teams clearer validation, sharper remediation, and far less operational friction.
Read more
How to Prioritize Vulnerabilities Effectively
Assaf Regev
02 Dec 2024
Traditional BAS tests expected scenarios. BAS 2.0 validates real exposure and real impact. That gives teams sharper prioritization with less overhead.
Read more
How DTCC Upgraded their SOC into a Cyber Threat Fusion Center
Pentera Team
25 Nov 2024
A modern SOC cannot operate in silos and still keep pace with today’s threats. A Cyber Threat Fusion Center brings intelligence, detection, response, and collaboration together so teams can act faster and with more context. The result is stronger resilience, better resource use, and a more effective defense posture.
Read more
Forti-fied? Logging blind spot revealed in FortiClient VPN
Peter Viernik
21 Nov 2024
VPN security depends on more than strong authentication—it also depends on visibility. When credential validation can happen without clear logging, attackers gain a dangerous advantage and defenders lose critical response time. Stronger logging, MFA, and continuous validation are essential to closing that gap.
Read more
What’s Behind the Rising Costs of Data Breaches?
Dana Meschiany
17 Nov 2024
Data breaches are becoming more expensive because attackers are hitting faster while security teams are stretched thinner. The biggest cost drivers are delayed detection, credential-based attacks, and complexity across hybrid environments. Reducing that impact requires stronger visibility, faster response, and more proactive validation of where real exposure exists.
Read more
Two New Zero-Day Vulnerabilities Uncovered in FortiClient VPN
Nir Chako
14 Nov 2024
Endpoint security can fail quietly when trusted services expose privileged functionality without proper access controls. In cases like this, a local low-privileged user may be able to escalate access, tamper with configurations, and reach sensitive data. That is why secure service design, rapid patching, and continuous validation are all critical.
Read more