Pentera Resources

Tap into our expert
cyber knowledge.

Explore, learn, and grow with our cybersecurity resources.

WebLogic - A Road to Post Exploitation
March 19, 2024
Pentera Labs | WebLogic – A Road to Post Exploitation
March 5, 2024
Cloud Demo
March 5, 2024
Pentera Cloud Panel
April 10, 2023
Evading detection by Windows Defender
March 26, 2023
DNS: The favorite adversary C2 channel
How hackers view your attack surface: From the POV of a former Black Hat hacker
March 26, 2023
How hackers view your attack surface: From the POV of a former Black Hat hacker
What 300 CISOs Say About 2023? – Poll Results Unveiled
March 26, 2023
What 300 CISOs Say About 2023? – Poll Results Unveiled
Don't just simulate, validate
June 20, 2021
Don’t just simulate, validate
Pentera CEO & Gary Kasparov discuss Deep Blue
April 14, 2021
Pentera CEO & Gary Kasparov discuss Deep Blue
Pentera CEO explains how you can be one step ahead of a password-cracking attempt
February 28, 2021
Pentera CEO explains how you can be one step ahead of a password-cracking attempt
The importance of verifying the security of new WFH environments
February 21, 2021
The importance of verifying the security of new WFH environments
Pentera is like the “Deep Blue” of cybersecurity
February 18, 2021
Pentera is like the “Deep Blue” of cybersecurity
IMPROVATE CyberSec 2021 interview
February 13, 2021
IMPROVATE CyberSec 2021 interview
Deloitte cybersecurity service automated penetration testing powered by Pentera
April 27, 2020
Deloitte cybersecurity service automated penetration testing powered by Pentera
Check Point’s CPX 360 event in Bangkok
March 18, 2019
Check Point’s CPX 360 event in Bangkok