Blog Posts

pentest, cybersecurity, red team, offense Christian Grupp pentest, cybersecurity, red team, offense Christian Grupp

How do I select a Penetration Tester?

When it comes to selecting a penetration testing vendor, there are several factors to consider. Before beginning the selection process, it's important to have a clear understanding of the scope of the assessment and the specific objectives you hope to achieve. This will help you identify the right type of vendor and ensure that they have the necessary capabilities to meet your needs.

Read More
pentest, offense, sql injection, TT&P, cybersecurity Christian Grupp pentest, offense, sql injection, TT&P, cybersecurity Christian Grupp

What is SQL Injection?

SQL injection is a type of cyber attack that exploits a vulnerability in the way a website or application interacts with a database. It allows an attacker to insert malicious code into a SQL statement, which is then executed by the database. This can give the attacker access to sensitive information, such as passwords, personal data, and even financial information.

Read More
OWASP Top 10, defense, pentest, cybersecurity Christian Grupp OWASP Top 10, defense, pentest, cybersecurity Christian Grupp

What is the OWASP Top 10?

The OWASP Top 10 is a list of the most critical web application security risks that organizations face. The OWASP (Open Web Application Security Project) is a non-profit organization that is dedicated to improving the security of web applications and services. The OWASP Top 10 is updated every three years to reflect the current state of web application security risks. In this blog post, we will discuss the OWASP Top 10 and why it is important for organizations to be aware of these risks.

Read More
pentest, cybersecurity, MITRE, TT&P Christian Grupp pentest, cybersecurity, MITRE, TT&P Christian Grupp

What is the MITRE ATT&CK framework?

The MITRE ATT&CK framework, short for Adversarial Tactics, Techniques, and Common Knowledge, is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. It helps organizations understand and detect the methods used by cyber attackers to infiltrate and compromise their systems. In this blog post, we will discuss what the MITRE ATT&CK framework is, its different elements, and how it can help organizations improve their cybersecurity.

Read More
cybersecurity, pentest, vulnerability assessment Christian Grupp cybersecurity, pentest, vulnerability assessment Christian Grupp

What is the difference between a penetration test and a vulnerability assessment?

When it comes to cybersecurity, penetration testing and vulnerability assessments are two important tools that are used to identify and assess security risks. However, these two terms are often used interchangeably, which can be confusing for non-technical users. In this blog post, we will discuss the difference between a penetration test and a vulnerability assessment, written for a non-technical user to understand.

Read More
pentest, cybersecurity, whitebox, graybox, blackbox Christian Grupp pentest, cybersecurity, whitebox, graybox, blackbox Christian Grupp

What is the difference between white, gray, and blackbox testing?

In the world of cybersecurity, testing is an essential aspect of identifying and mitigating vulnerabilities in computer systems, networks, and web applications. One of the most commonly used methods for testing is penetration testing, or "pen-testing" for short. Pen-testing involves simulating a cyber attack to identify vulnerabilities that could be exploited by an attacker. There are three main types of pen-testing: white box, gray box, and black box testing. In this blog post, we will discuss the key differences between these types of testing and the pros and cons of each approach, written for a non-technical user to understand.

Read More
pentest, cybersecurity, red team Christian Grupp pentest, cybersecurity, red team Christian Grupp

How often should I pen test my business?

Determining how often to conduct a penetration test for your company can be a challenging task. The frequency of your pen-tests should be based on various factors such as industry, size, and risk. In this blog post, we will discuss the different factors that should be considered when determining the frequency of your pen-tests and provide guidelines on how often your company should conduct them.

Read More