Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

Blog
Cyber in the Board Room: From Security Findings to Business Action
Learn more
Blog
How to Win Cybersecurity Budget Approval with Continuous Validation
Learn more
1 / 3
Pentera at $100M ARR – A CEO Reflection
Amitai Ratzon
06 Jan 2026
When I joined forces with our Founder and CTO, Dr. Arik Liberzon, and stepped into the CEO role back in 2018, $100M ARR felt like a number reserved for big, mature companies.
Read more
Cyber in the Board Room: From Security Findings to Business Action
Stephen Tutterow
20 Oct 2025
I’ve seen too many good findings die in bad presentations. I’ve watched technical teams do heroic work, only to have their insights lost in translation. I’ve also been that person, walking into a board meeting armed with risk data and walking out with silence.
Read more
How to Win Cybersecurity Budget Approval with Continuous Validation
Shakel Ahmed
25 Sep 2025
It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you're a CISO or security leader, you've likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next breach is one blind spot away.
Read more
AI Is Transforming Cybersecurity Adversarial Testing – Pentera Founder’s Vision
Arik Liberzon
06 Aug 2025
In 2015 I founded a cybersecurity testing software company with the belief that automated penetration testing was not only possible, but necessary. At the time, the idea was often met with skepticism, but today, with 1200+ of enterprise customers and thousands of users, that vision has proven itself.
Read more
They’re Out to Git You: How to Find Exposed Repos Before Attackers Do
Or Smolnik
29 Jul 2025
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems
Read more
Jen Easterly’s Xposure Keynote: How to Use KEV and AI to Stay Ahead of Cyber Threats
Aviv Cohen
23 Jul 2025
I’ve spoken with plenty of cybersecurity leaders in my time, but hosting Jen Easterly at Pentera’s National Xposure 2025 summit felt different. As a former Director of CISA, she’s got that rare blend of battlefield grit, boardroom poise, and TED Talk charisma.
Read more
The Crowded Battle: Key Insights from the 2025 State of Pentesting Report
Jason Mar-Tang
22 May 2025
Pentera surveyed 500 CISOs from global enterprises to understand the strategies, tactics, and tools they use to cope with the thousands of security alerts, the persisting breaches and the growing cyber risks they have to handle.
Read more
The Enterprise Attack Surface: Analysis from 500 CISOs
Jason Mar-Tang
21 May 2025
The modern attack surface is sprawling, dynamic, distributed, and dangerously opaque. As enterprises expand into cloud-native or hybrid architectures, deploy APIs by the thousands, and integrate IoT and OT devices into core operations, the surface area for cyber threats grows both in size and complexity.
Read more
Scaling Security Validation for the Enterprise: The Vision Behind Pentera 7
Arik Liberzon
24 Apr 2025
Seeing Pentera set a new standard for Enterprise-scale security validation with the launch of Pentera 7 brings me a great deal of satisfaction as a further step towards realizing my early vision for Pentera.
Read more
Kubernetes Annotation Security Risks in AWS
Dvir Levy
24 Apr 2025
Misconfiguring just one word in Kubernetes can expose your AWS environment to the internet, putting your data and applications at serious risk. Kubernetes and AWS are essential tools for managing scalable applications, yet their complexity can sometimes lead to critical misconfigurations.
Read more
Security Research Techniques: Build Before You Break
Nir Chako
14 Apr 2025
As security researchers, we deal with some of the most complex systems out there. While our work seems purely analytical, a lot of our decisions come down to gut feelings. This intuitive side of our work is crucial and can often be the key to a breakthrough, rather than hitting...
Read more
Pentera API Security Automation: Advanced Cybersecurity Use Cases
Stefan Jansson
01 Apr 2025
If you’re looking for ways to automate and streamline your security validation operations, the Pentera API is a powerful tool to have in your arsenal. With capabilities that range from real-time visibility into validation testing operations and findings to seamless integration with automated workflows, the Pentera API is all about...
Read more