The Next Generation Penetration Test An Alternative to Traditional Penetration Testing

The Next Generation Penetration Test: An Alternative to Traditional Penetration Testing

The concept of penetration testing was born in the 1990s as a process of adversary simulation. Its job was to define what a malicious attacker is likely to do, and what they can actually do in a given system. Throughout the decades, high profile security incidents have made security a tangible topic for all. After …

The Next Generation Penetration Test: An Alternative to Traditional Penetration Testing Read More »

Nordic Defender Capture the Flag Competition Chapter Three: Loki

Swedish CTF participants arrive in Loki’s territory on 19 July 2021. The trickster Loki has changed the rules of the game, so not everyone can achieve his great treasury. Based on Loki’s “static point” rule, only the first hunter who solves each challenge gets the full points. The score of the solved challenges decreases gradually …

Nordic Defender Capture the Flag Competition Chapter Three: Loki Read More »

Nordic Defender Capture the Flag Competition Chapter Two: Odin

Odin’s territory remained unconquered after one day The second round of the Nordic’s greatest Capture the Flag challenge started at 4 PM (CET) on the 20th of April. The competition named “Odin” consists of 6 easy, 8 medium, 6 hard challenges. By solving these 20 challenges, participants can collect a total of 2350 points. 1200 …

Nordic Defender Capture the Flag Competition Chapter Two: Odin Read More »

Nordic defender Capture the Flag Chapter One: Tyr

Groundbreaking Records! Congratulations on the unprecedented record you set in our Challenge. We would like to thank all the teams and individuals for participating in the Nordic Defender Challenge Program and for the feedback they gave to help us improve the program. The challenge boasts the participation of 823 teams, 670 individuals from 128 countries …

Nordic defender Capture the Flag Chapter One: Tyr Read More »

Type of Computer forensics investigation

Goal and Purpose of Computer Forensics

“Computer forensics is one of the three main functions of computer security: the TRIAD consists of vulnerability assessment and risk management, network intrusion detection, and incident response computer investigations.” What is computer forensics? A computer forensic is a methodical series of techniques and procedures for gathering evidence from computing equipment and various storage devices and …

Goal and Purpose of Computer Forensics Read More »