Pentesting

A Complete Penetration Testing Guide With Sample Test Cases – Download

The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and security professionals.


0 Comments1 Minute

S1E15 – Remote Work & Cybersecurity: 10 Tips to Protect Your Home Network

The Internet makes it possible for almost anyone to work from anywhere in the world. Accessing documents and files remotely is both fast and convenient. But there’s a problem. Working from home opens up a can of worms when it comes to cybersecurity. In this live podcast, we share…


0 Comments1 Minute

Cybersecurity Services - The 10 Best Cybersecurity Tips for Employees Working Remotely

Cybersecurity Solutions – The 10 Best Tips for Employees Working Remotely

Trick-or-treating may capture much of the attention this month, but for years Halloween has competed with another significant event. Check out these great tips from a Cybersecurity Solutions company. As we continue with this topic, the theme for week three revolves around working and networking.…


0 Comments10 Minutes

S1E14 – Staff Augmentation 101: Get the DevOps Expertise You Need

Today’s business landscape requires companies to have the flexibility to launch new products, services, and projects rapidly. Unfortunately, this puts much pressure on DevOps departments, which sometimes lack vital skillsets and resources, resulting in compromised quality,…


0 Comments1 Minute

Cybersecurity Awareness Month

Cybersecurity Awareness Month 2021 – Week 2: Sharing Special Moments

As Cybersecurity Awareness Month (CSAM) approaches the halfway point, this week’s Get Cyber Safe theme revolves around “Sharing special moments.” More specifically, the Government of Canada’s initiative on cybersecurity awareness for individuals, as well as, for Small and…


0 Comments6 Minutes

S1E13 – Password Management done Right with LastPass…|

👉 Did you know that 81% of hacking-related cybersecurity breaches are due to password issues? Credentials remain one of the most sought-after pieces of information for hackers, and it’s still proving to be effective in their attack efforts. In this LIVE podcast, we interview Mike…


0 Comments1 Minutes

S1E13 – Password Management done Right with LastPass

Password Management done Right with LastPass…| Did you know that 81% of hacking-related cybersecurity breaches are due to issues with #passwords? Credentials remain one of the most sought-after pieces of information for hackers, and it’s still proving to be effective in their…


0 Comments1 Minute

Installing Metasploitable 2 on VirtualBox 6.1

My cheat works! #Metasploitable 2 is a Linux operating system developed with the highest security vulnerabilities in mind. You can perform all kinds of tests to perfect security techniques or learn how to get the most out of applications designed for this purpose. Attacks include: SQL…


0 Comments1 Minute

Cybersecurity Awareness Month 2021

Cybersecurity Awareness Month 2021

For many, October is the month of trick or treating and getting candy. But not too many people know that this month is dedicated to a topic that, if ignored, can be much more terrifying: cybersecurity. In today’s technology-driven world, the cyber threat landscape is constantly evolving. You…


0 Comments4 Minutes

Installing OpenVAS GVM on KALI Linux the right way!

Installing OpenVAS can be tricky, especially because of problems with the feeds from Greenbone (GVMD_DATA, SCAP and CERT). You may get errors such as the famous “Failed to find config.” In this video, I show you how to successfully install OpenVAS by checking that the feeds…


0 Comments1 Minute