Preventing DHCP Spoofing Attacks
DHCP is an essential Windows networking protocol and a favorite among network admins. Let’s go over the basics of DHCP allocation and review common ...
Understanding VMware vCenter Privilege Escalation
Executive summary
Pentera’s research team ‘Pentera Labs’ discovered a vulnerability in VMware’s vCenter Server program. The affected VMware s...
Exploring the PrintNightmare Vulnerability
Greenpeace recently took credit for the PrintNightmare exploitation, warning that if the world does not shift to paperless immediately, further deva...
Understanding Top Exploited Vulnerabilities
There are patches or remediations for all the top vulnerabilities, but they’re still being exploited in the wild. Why is that? Well, if you were the...
Welcome to Pentera’s Next Phase of Security
Today we embark on a new journey. One that will have even a bigger impact on our customers, as we continue to contend with the ever-evolving threat ...
Must-Have Features for Security Validation Tools
With an expanded remote workforce and an increase in cyber-attacks over the past year, validating organizational resilience has become a top enterpr...
Password Security Tips: How to Create a Stronger Password
Would you believe that 49% of all data breaches involve passwords? The Verizon Data Breach Investigations Report highlights that stolen or weak passwo...
Cybersecurity Highlights of 2020
The Greatest Hits of 2020
Who doesn’t love some good old nostalgia? Ok, it’s true, many of us are glad to see the back of 2020. But as we sta...
The Buyer's Guide to Security Validation
Download
Lessons from the SolarWinds Supply Chain Attack
True Story, Verbatim
“Let’s stop the test here, and continue tomorrow,” came unexpectedly from the CISO of a multi-billion technology company...