Profile cover photo
Profile photo
CrossGroup Security LTD
1 follower -
Threat Prevention at the Highest Level
Threat Prevention at the Highest Level

1 follower
About
Posts

Post has attachment
Do your encryption and mobile device management protocols actually ensure safety? Can it be even possible to construct scaling and secure solutions for devices and mobile platforms? And when it is, how can you implement those options without compromising…
Add a comment...

Post has attachment
In this post we’re going to discuss a few performance optimisations which can be made to Burp Suite (notably the JVM) which considerably increases performance and can drastically reduce the amount of time taken on an engagement. Make sure that you are…
Add a comment...

Post has attachment
Powershell Empire is one of our all time favourite tools for engagements where targeting users is in scope however we generally use a combination of Metasploit and Empire to get the job done, using browser exploits in conjunction with the standard stagers…
Add a comment...

Post has attachment
With the recent increase in attacks, network security has become a talking point and focus for most security teams. The threats organisations are facing are evolving at an ever increasing pace, threat actors are better equipped and more knowledgeable than…
Add a comment...

Post has attachment
Today, companies and organisations face a vast array of threats which may lead to a breach. Essential to any information security strategy is to identify assets and establish a set of requirements around the testing of these assets which provides…
Add a comment...

Post has attachment
Common Questions Regarding Grey-Box Testing

What is the reason that Grey-box testing is based on requirement based test case generation? Grey-box testing uses assertion methods to preset all the conditions required, prior to a program being tested. Formal testing is one of the commonly used…
Add a comment...
Wait while more posts are being loaded