Author: Mateusz Gierblinski
-
Cybersecurity Challenges and Insights on Penetration Testing, Attack Surface Management, Cloud Security, and Phishing Simulation
•
In today’s quickly evolving business world, organizations of all sizes face various cybersecurity threats. Not only are attackers working around the clock poking at everything they can attack but also insider threats are on the rise, phishing becomes more sophisticated, and timelines for developers leave organizations vulnerable to cyber threats.…
-
Introduction to Adversary Emulation with Caldera
•
Caldera is an open source C2 platform developed by MITRE designed for adversary emulation and automated security testing. It provides a comprehensive framework to simulate and evaluate potential threats to an organization’s systems. Caldera focuses on improving cybersecurity by enabling security professionals to test and enhance their detection, prevention, and…
-
Fuzzing Open Source Applications
•
Introduction Fuzzing is an automated software testing technique used primarily to uncover bugs and security vulnerabilities in software. It involves generating many genuine, random, semi-random and faulty inputs to a software program to crash or behave unexpectedly. Here are few key aspects of fuzzing: Types of Fuzzing: AFL++ AFL++ (American…
-
PKI Infrastructure
•
Public Key Infrastructure (PKI) is a system of technologies and protocols that enables secure communication and digital identity verification by using digital certificates and cryptographic keys. What is PKI Infrastructure? PKI, which stands for Public Key Infrastructure, is a comprehensive framework of policies, processes, technologies, and cryptographic techniques used to…