Topics
Topics
The field is empty
Pentera Team
10 articles by this writer
Blurring Boundaries: Risks of AWS SSM in Hybrid Landscapes

Deciphering the Risks of AWS SSM in Hybrid Environments

Introduction  Hybrid cloud environments are becoming the backbone of enterprise IT infrastructure, offering unparalleled scalability and flexibilit...

Continuous Security Validation Against AI-Driven Threats – A Field CISO’s Insights

Despite substantial investments in cybersecurity, breaches keep happening—especially as AI changes the game for attackers and defenders alike. AI-driv...

Assessing Your Attack Surface from an Attacker’s Perspective

In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams w...

Identifying and Mitigating the PwnKit Vulnerability

While it may seem like the right course of action is to stop everything and immediately start patching the recent PwnKit vulnerability, this probabl...

Exploring the PrintNightmare Vulnerability

Greenpeace recently took credit for the PrintNightmare exploitation, warning that if the world does not shift to paperless immediately, further deva...

Understanding Top Exploited Vulnerabilities

There are patches or remediations for all the top vulnerabilities, but they’re still being exploited in the wild. Why is that? Well, if you were the...

Must-Have Features for Security Validation Tools

With an expanded remote workforce and an increase in cyber-attacks over the past year, validating organizational resilience has become a top enterpr...

Cybersecurity Highlights of 2020

The Greatest Hits of 2020 Who doesn’t love some good old nostalgia? Ok, it’s true, many of us are glad to see the back of 2020. But as we sta...