Here’s Why Managed Service Providers Are The Solution To Cyberattacks in Payment Processing Security

Businesses all over the world are appreciating the benefits of using payment processing in their companies. From its flexibility, customization, and efficiency, companies continue to embrace growth with payment processors. However, just like any other payment method, payment processors are susceptible to cyberattacks.  Explaining Payment Processing As the world turns paperless, transactions become more convenient. […]

Even FireEye got hacked – Are you safe from hackers?

Even a large professional security company like FireEye got hacked the other day by what was claimed to be a nation-state (fire eye breach statement). This hack is a clear example that anyone is vulnerable, and requires adequate hack detection and hack prevention. FireEye had their security detection well in place, which resulted in them […]

Is your webserver protected against hackers?

Hackers and cyber criminals are going after your online servers, 24 hours a day 7 days a week. They run automated scripts and tools to break into your website. They want to steal your customer data and try to bribe you with this data. You can stay ahead of the game and find out where […]

Bug hunting, for fun and profit. My slightly but not so technical how to guide for anyone.

This article reflects not only how I like to do bug bounty programs, but also how I approach most of my normal penetration tests, red teams or web security assessments. It works well for me and many clients I’ve served have been helped by it. It might very well be not your exact style. I try to show here the […]

Practical advice on time management and where to focus on when you want to kick ass at any course and study!

One of the topics that came along during my call for subjects was that of preparations for courses, especially the time management part when having a full time job or being a student.  I understand where this comes from, I’ve had similar doubts in the past myself. Many courses seem massively large and look like an unclimbable mountain or […]

Radical Red Teaming, adding value to your company’s resilience

On a day to day basis I get asked why companies should care more about red teams. Often within the same sentence it is stated that a standard penetration test is sufficient and that other forms of offensive security assessments aren’t needed “because everything is covered already” or “else it might break” One thing I’ve […]

Security Vulnerabilities in a Mainframe Emulator from Micro Focus

In March 2017 my colleague Meiyer Goren and myself have been requested through our employer Comsec by one of our clients to do an assessment on their new mainframe setup. They had decided a year earlier to replace their regular mainframe setup by a mainframe emulator, the Micro Focus Enterprise Server suite. This product is […]

Cyber Reasoning Systems will disrupt the Cyber Security Industry as we know it.

Wouldn’t it be an amazing sight? Artificial Intelligent Sentinels communicating each other through neural networks, digging deep through big data. Al for making the world a safer place. This is what the future looks like: Cyber Reasoning Systems (CRS) will emerge and are inevitably responsible for global disruption of the cyber security consultancy industry. The […]