Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the rocket domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /nas/content/live/penteraio/wp-includes/functions.php on line 6121

Notice: La fonction _load_textdomain_just_in_time a été appelée de façon incorrecte. Translation loading for the acf domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Veuillez lire Débogage dans WordPress (en) pour plus d’informations. (Ce message a été ajouté à la version 6.7.0.) in /nas/content/live/penteraio/wp-includes/functions.php on line 6121
Blog - Pentera
Topics

Warning: Undefined property: WP_Post_Type::$term_id in /nas/content/live/penteraio/wp-content/themes/Pentera_theme/header-blog.php on line 202

Warning: Undefined property: WP_Post_Type::$parent in /nas/content/live/penteraio/wp-content/themes/Pentera_theme/header-blog.php on line 203

Warning: Undefined property: WP_Post_Type::$taxonomy in /nas/content/live/penteraio/wp-content/themes/Pentera_theme/header-blog.php on line 204

Warning: Undefined array key "topic" in /nas/content/live/penteraio/wp-content/themes/Pentera_theme/header-blog.php on line 210
Topics
The field is empty
Recent

Jen Easterly’s Xposure Keynote: How to Use KEV and AI to Stay Ahead of Cyber Threats

I’ve spoken with plenty of cybersecurity leaders in my time, but hosting Jen Easterly at Pentera’s National Xposure 2025 summit felt different. As a f...
ingress-nightmare

IngressNightmare Returns: 3 New Injection Points and How to Keep Attackers Out

Introduction When Wiz first disclosed IngressNightmare, they revealed a chain of vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514 and CV...

The Crowded Battle: Key Insights from the 2025 State of Pentesting Report

In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises to understand the strategies, tactics, and t...

The Enterprise Attack Surface: Analysis from 500 CISOs

Results from Pentera’s 4th Pentesting report, which surveyed around 500 CISOs globally, show that while Exposure Management practices are maturing, th...

Scaling Security Validation for the Enterprise: The Vision Behind Pentera 7

Seeing Pentera set a new standard for Enterprise-scale security validation with the launch of Pentera 7 brings me a great deal of satisfaction as a fu...
2024 State of Pentesting Survey
Download

Kubernetes Annotation Security Risks in AWS

Misconfiguring just one word in Kubernetes can expose your AWS environment to the internet, putting your data and applications at serious risk. Kubern...
security research techniques

Security Research Techniques: Build Before You Break

I've been in security research for quite a while now, so I've had more than a few opportunities to guide researchers during their security research en...

Pentera API Security Automation: Advanced Cybersecurity Use Cases

If you’re looking for ways to automate and streamline your security validation operations, the Pentera API is a powerful tool to have in your arsenal....
Begin your security validation journey
Request a demo
Book your demo now >
Explore

CVE-2024-47176 – Linux Privilege Escalation via CUPS Vulnerability

What is CVE-2024-47176? A Linux Privilege Escalation Vulnerability CVE ID: CVE-2024-47176 Description: A privilege escalation vulnerability in the...
Blurring Boundaries: Risks of AWS SSM in Hybrid Landscapes

Deciphering the Risks of AWS SSM in Hybrid Environments

Introduction  Hybrid cloud environments are becoming the backbone of enterprise IT infrastructure, offering unparalleled scalability and flexibilit...

Ransomware Insider Threats: Understanding the Growing Danger

Understanding the Risks of Ransomware Insider Threats The trope of the burglar comparison in cybersecurity is more than overused. But when we talk ...

Continuous Ransomware Validation: Why Annual Testing Is No Longer Enough

Ransomware isn’t just a security issue; it’s a business problem that’s grown too big to ignore. What started as floppy-disk attacks back in the 1980s ...

What is BAS 2.0 and Why You Need It

In a fast-evolving threat landscape, traditional Breach and Attack Simulation (BAS) tools are limited. Built based on predefined scenarios, they’re gr...

How to Prioritize Vulnerabilities Effectively

There are patches or remediations for all the top vulnerabilities, but they’re still being exploited in the wild. How is that? Well, if you were the a...
The Buyer's Guide to Security Validation
Download

How DTCC Upgraded their SOC into a Cyber Threat Fusion Center

By Shawn Baird, Associate Director, Offensive Security and Tactics, DTCC Based on a session given at PenteraCon 2024 When the speed and complexity...