Penetration Test

Penetration Testing e MFA Piergiorgio Venuti

Penetration Testing and MFA: A Dual Strategy to Maximize Security

In a digital world where cyber threats are increasingly sophisticated, multi-factor authentication (MFA) represents a crucial defense against unauthorized access. However, the growing prevalence of phishing attacks aimed at bypassing MFA raises significant questions about post-authentication security and the overall effectiveness of security strategies. In this context, we examine how penetration testing can be used to assess and strengthen the…

Penetration Testing Dove Colpire Piergiorgio Venuti

Penetration Testing: Where to Strike to Protect Your IT Network

Introduction In an increasingly interconnected and digital world, cybersecurity has become a top priority for companies of all sizes. One of the most effective techniques to identify vulnerabilities and improve security is penetration testing, also known as pen testing or ethical hacking. But in a complex network with different environments, which ones are the most suitable for pen testing efforts?…

purple team cover Giacomo Lanzi

Red Team, Blue Team and Purple Team: what are the differences?

When we talk about cybersecurity and find ourselves on the side of the attacked, we often limit ourselves to thinking in terms of defense, protection and containment of threats. However, the approach that works best is one in which you put yourself in the attacker’s shoes and treat your infrastructure as the target of their actions. Only in this way…

CIS Controls e Vulnerability Assessment Piergiorgio Venuti

CIS Controls and Vulnerability Assessment: practical guide to adopting best practices

Critical Security Controls, also known as CIS Controls, are a series of cybersecurity actions and technologies developed to protect organizations from common and effective cyber attacks. This article explains what CIS is, the benefits of adopting CIS Controls and how to integrate them into the Vulnerability Assessment process to improve your security posture. What is CIS (Center for Internet Security)?…

servizio di vulnerability assessment continuativo Piergiorgio Venuti

Protect your company with a continuous vulnerability assessment service: the perfect solution to integrate VA and PT

Cybersecurity has become a fundamental pillar of modern businesses, and with the increase of threats and risks, it is imperative to adopt ever more advanced protection measures. In this context, the Vulnerability Assessment (VA) and the Penetration Test (PT) play a crucial role. However, it is also necessary to consider the importance of an ongoing vulnerability assessment service to guarantee…

Penetration Test Interno Piergiorgio Venuti

Why it is essential to carry out the Internal Penetration Test as well as the external one: a complete guide to IT security

In an increasingly connected and digitized world, cyber security has become a major concern for businesses. An effective protection system must provide for the implementation of both external and internal measures to ensure maximum security of data and company resources. In this article, we will explore the importance of performing Internal as well as external Penetration Testing and how Secure…

certificazioni red team cover Giacomo Lanzi

The certifications of the SOD Red Team

In order to keep the eye on your IT infrastructure, hire a Red Team with certifications it is the ideal choice . The analyzes carried out by a certified Red Team are aimed at the protection and prevention of attacks and data losses. Obviously, an in house Red Team would require hefty hiring costs and a constant financial effort to…

Ethical Hacking Matrix Giacomo Lanzi

Ethical hacking: defending knowing how to attack

Ethical hacking means the application for good of hacking techniques. The term “hacker” was coined in the 1960s at the Massachusetts Institute of Technology (MIT) to describe experts who used their skills to re-develop mainframe systems, increasing their efficiency and allowing them to perform more tasks. Nowadays, the term normally describes experienced programmers who gain unauthorized access to computer systems…

Standard ISO 27001 Giacomo Lanzi

Does ISO 27001 standard require a Pentest?

A legitimate question that often arises is whether the Penetration Test is necessary for compliance with the ISO 27001 standard. To fully understand the answer, it is necessary to clarify what is meant by these terms and to understand the relationship between all the components of the certification. ISO 27001 standard A technical standard, also incorrectly called a standard, is…

Sicurezza delle reti informatiche con il Pentest e il Vulnerability assessment Giacomo Lanzi

Computer network security: PT vs. VA

The security of computer networks is of vital importance for a company. With technologies increasingly relying on remote services, it is good to ensure that security is guaranteed. To do this, two tools are used: Vulnerability Assessment and Penetration Test. But what is the difference between them? The answer to this question is not as obvious as one might think….

pentest e sicurezza informatica Giacomo Lanzi

Security: pentest and verification of vulnerabilities

The computer security of a system is very important to avoid unpleasant inconveniences due to malicious attacks. In principle, it is not enough to set up a complete security system, you must also check that the above systems are working. To do this we turn to professionals who can carry out pentest (penetration tests) and carry out a vulnerability check….

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal Title: Xorux LPAR2RRD File Upload Directory Traversal Advisory ID: KL-001-2025-016 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: LPAR2RRD      Affected Version: 8.04 and prior      Platform: Rocky Linux 8.10      CWE...
  • KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information Title: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information Advisory ID: KL-001-2025-015 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-015.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: LPAR2RRD      Affected Version: 8.04 and […]
  • KL-001-2025-014: Xorux LPAR2RRD Read Only User Denial of Service July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-014: Xorux LPAR2RRD Read Only User Denial of Service Title: Xorux LPAR2RRD Read Only User Denial of Service Advisory ID: KL-001-2025-014 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: LPAR2RRD      Affected Version: 8.04 and prior      Platform: Rocky […]
  • KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator Title: Xorux XorMon-NG Web Application Privilege Escalation to Administrator Advisory ID: KL-001-2025-013 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-013.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: XorMon-NG      Affected Version: 1.8 and prior...
  • KL-001-2025-012: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-012: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information Title: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information Advisory ID: KL-001-2025-012 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-012.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: XorMon-NG     ...
  • Multiple vulnerabilities in the web management interface of Intelbras routers July 20, 2025
    Posted by Gabriel Augusto Vaz de Lima via Fulldisclosure on Jul 19=====[Tempest Security Intelligence]========================================== Multiple vulnerabilities in the web management interface of Intelbras routers Author: Gabriel Lima =====[Table of Contents]====================================================== 1. Overview 2. Detailed description 3. Other contexts & solutions 4. Acknowledgements 5. Timeline 6. References =====[1....
  • Missing Critical Security Headers in OpenBlow July 13, 2025
    Posted by Tifa Lockhart via Fulldisclosure on Jul 12Advisory ID: OPENBLOW-2025-003 Title: Missing Critical Security Headers in OpenBlow Date: 2025-07-12 Vendor: OpenBlow (openblow.it) Severity: High CVSS v3.1 Base Score: 8.2 (High) Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N Summary: Multiple public deployments of the OpenBlow whistleblowing software lack critical HTTP security headers. These configurations expose users to client-side vulnerabilities including […]
  • SAP NetWeaver S/4HANA - ABAP Code Execution via Internal Function July 11, 2025
    Posted by Office nullFaktor GmbH on Jul 11nullFaktor Security Advisory < 20250719 > =========================================================== Title: ABAP Code Execution via Internal Function Module WRITE_AND_CALL_DBPROG Vulnerability: Exposed Dangerous Functionality Product: SAP NetWeaver S/4HANA Homepage: http://www.sap.com Affected Version: S/4HANA, SAP_BASIS 757 SP 3 SAP Note: 3546011 Impact: High...
  • Tiki Wiki CMS Groupware <= 28.3 Two Server-Side Template Injection Vulnerabilities July 10, 2025
    Posted by Egidio Romano on Jul 09---------------------------------------------------------------------------------- Tiki Wiki CMS Groupware
  • KL-001-2025-011: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery July 9, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 09KL-001-2025-011: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery Title: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery Advisory ID: KL-001-2025-011 Publication Date: 2025-07-09 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-011.txt 1. Vulnerability Details      Affected Vendor: Schneider Electric      Affected...

Customers

Newsletter

{subscription_form_1}