In this post, we will examine one method of encrypting data-at-rest, specifically how to achieve Data-at-Rest Encryption for MongoDB Community Editi...
After CentOS 8 was declared end-of-life (EOL), we had to plan a CentOS to Ubuntu migration as an alternative operating system (OS) for our on-premis...
In this article, we will show how it’s possible to use reflective loading to run Mimikatz while evading detection by Windows Defender. While this is...
In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams w...
This article is part of Pentera’s Engineering Series – a behind-the-scenes look at the technologies we develop to keep companies secure. In this pie...
Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These c...
Much of a company’s assets are connected to Wi-Fi networks. However, security teams are often less likely to validate these networks. This pushed us...
If you're heading out of the office on a well-deserved vacation, are you certain the security controls you have in place will let you rest easy whil...
If we could nominate a command-line utility for an award, PsExec would undoubtedly win the "Most Useful" category. This tool enables administrators ...
External Attack Surface Management (EASM) tools have been around for some time, but only recently has Gartner recognized this category as a top tren...