fbpx
Attack Surface Management – IP Addresses

Attack Surface Management – IP Addresses

We wrote this Blog in order to guide people on what IP addresses to use when they are using the Robo Shadow vulnerability Scanner to externally scan IP addresses. However it will also help in assisting any one who wants to understand what their scope of Penetration Test should be and the all-round thought process on […]

Read More - Attack Surface Management
CVE Vulnerabilities Found – What To Do Next

CVE Vulnerabilities Found – What To Do Next

This Blog is intended for people who have done an external Penetration Test or Vulnerability Scan and found vulnerabilities on some of your open ports. This is just a quick step through of where the vulnerabilities come from and how to potentially remediate / risk accept different scenarios. “CVE Vulnerabilities found” In your Penetration Test / […]

Read more - CVE Vulnerabilities Found – What To Do Next
Penetration Test “Ports Open” Explained

Penetration Test “Ports Open” Explained

So this Blog is intended to give an overview of how people should view results when they receive a Penetration test / vulnerability assessment report and how to deal with “Ports Found” on a Penetration Test / Vulnerability Assessment. This is a fairly wide ranging topic depending on your setup so if there is any […]

Read more - Penetration Test “Ports Open” Explained
Common Ways Hackers Can Get Into Your System

Common Ways Hackers Can Get Into Your System

So we spend a lot of time trying to explain to various organisations and individuals about the types of hackers out there and how people are likely to come into contact with them.  Below is a quick run down of the types of hackers to be aware of and some insight on how they might […]

Read more - Common Ways Hackers Can Get Into Your System
How To Certify Vulnerability Assessment / Penetration Test.

How To Certify Vulnerability Assessment / Penetration Test.

At the time of writing this Blog our new “Online Vulnerability Assessment” had just gone live, We were inundated with requests for more clarification around the governance on this new functionality. We decided to put a “Stamp of Certification” on each of the IP Scanning reports sent out to all of our users who conduct […]

Read more - How To Certify Vulnerability Assessment / Penetration Test.
Robo Shadow AI CVE Early Warning System

Robo Shadow AI CVE Early Warning System

Why we built the Robo Shadow CVE Vulnerability Early Warning System The Robo Shadow EWS (Early Warning System) is a deep neural network AI prediction system running on top of the global CVE vulnerability databases (supplied by Mitre in the USA). Initially when discovered, global vulnerabilities are released as a free text alert by Mitre […]

Read more - Robo Shadow AI CVE Early Warning System
Is Windows Defender Enough Protection?

Is Windows Defender Enough Protection?

“Is Windows Defender enough? Microsoft’s own built-in Anti-Virus (Windows Defender) has been around for long enough to have proven itself self on a world stage, does its success mean the end to Anti-Virus costs?” This Blog looks at the Windows Defender topic to understand if many of us are paying for Anti-Virus we do not […]

Read more - Is Windows Defender Enough Protection?
4 Free Tools from Microsoft to pass a Penetration Test

4 Free Tools from Microsoft to pass a Penetration Test

We get asked a lot of questions about what setup do you need to implement on the Windows desktop side to pass an internal penetration test.  This can be a challenging question to answer as there is no real gold standard for this, however out of the thousands of internal penetration tests we have been […]

Read more - 4 Free Tools from Microsoft to pass a Penetration Test
We use cookies to ensure that we give you the best experience on our website.