Category: EN

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code. Cloud computing is the shared responsibility of the Cloud provider and the client who earn the service from…

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed “perfctl,” actively targeting millions of Linux servers worldwide. This malicious software exploits over 20,000 types of server misconfigurations, posing a significant threat to any Linux server connected to the internet. The malware’s…

Strengthening Security Posture Through People-First Engagement

As attackers continue to find new ways to profit from vulnerabilities, organizations of all sizes face an ever-present threat. With attacks becoming more frequent and businesses growing increasingly desensitized to these risks, the importance of having a comprehensive, proactive response…