How to Bypass RootBeer’s Root Detection

Image for How to Bypass RootBeer's Root Detection

During the android penetration testing process, one of the challenges is to bypass root detection in order to be able to access the target application folder on the device.

Branding Protection

Image for Branding Protection

Our world is surrounded by brands, even if we talk about global brands or small local brands that are trying to become popular, we see them everywhere. But why do we trust a brand? In this article,…

Remediation of Exchange Server Vulnerabilities

Image for 5 Măsuri de Securitate Cibernetică în Era COVID-19

This guidance will help customers address threats taking advantage of the recently disclosed Microsoft Exchange Server on-premises vulnerabilities CVE-2021-26855, CVE-2021-26858, CVE-2021-26857, and…

How Easy Is It to Crack a Password?

Image for 5 Măsuri de Securitate Cibernetică în Era COVID-19

Cracking a password can be easier than you think, by the time you’re done with this article you’ll be aware of how important it is to have a strong password.

Guidance in Cyber Security Trainings

Image for Guidance in Cyber Security Trainings

In the need to increase their cyber security resilience, companies start searching for cyber security trainings . This thing, in fact, is a very normal and recommended action.

How to Expand Your Attack Surface

Image for 5 Măsuri de Securitate Cibernetică în Era COVID-19

Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface?

Can We Detect APT Attacks?

Image for Can We Detect APT Attacks?

In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is…