Topics
The field is empty
Pentera Team
11 articles by this writer

Continuous Security Validation Against AI-Driven Threats – A Field CISO’s Insights

Despite substantial investments in cybersecurity, breaches keep happening—especially as AI changes the game for attackers and defenders alike. AI-driv...

Assessing Your Attack Surface from an Attacker’s Perspective

In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams w...

Identifying and Mitigating the PwnKit Vulnerability

While it may seem like the right course of action is to stop everything and immediately start patching the recent PwnKit vulnerability, this probabl...

Understanding Ransomware Insider Threats

The trope of the burglar comparison in cybersecurity is more than overused. But when we talk about the damage of a break-in, it’s not just picking t...

Exploring the PrintNightmare Vulnerability

Greenpeace recently took credit for the PrintNightmare exploitation. Warning that if the world does not shift to paperless immediately, further deva...

Understanding Top Exploited Vulnerabilities

There are patches or remediations for all the top vulnerabilities, but they’re still being exploited in the wild. Why is that? Well, if you were the...

Must-Have Features for Security Validation Tools

With an expanded remote workforce and a rise in cyber-attacks over the past year, validating organizational resilience is top of the enterprise agen...

Key Lessons from the Top 5 Cyber Attacks of 2020

Remote working is often cited as one of the top reasons for the rise in cyber-crime in 2020, but it’s far from the only growing challenge for today’...