NetSPI unveils two open-source tools to assist defence teams in uncovering vulnerable network shares
At Black Hat USA 2022, NetSPI has unveiled two new open-source tools for the information security community: PowerHuntShares and PowerHunt. These new adversary simulation …
The challenges and advantages of building behavior-based threat detection
In this video for Help Net Security, Scott Sutherland, Senior Director, Adversary Simulation and Infrastructure Testing, NetSPI, discusses how, in order to stay ahead of …
Infosec products of the month: February 2022
Here’s a look at the most interesting products from the last month, featuring releases from: Arista Networks, Blueshift Cybersecurity, Bugcrowd, Cato Networks, Cofense, …
New infosec products of the week: February 25, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Arista Networks, Darktrace, Forcepoint, MyCena, NetSPI, Ondato, Sumo Logic, and …
NetSPI Attack Surface Management enhances security posture for organizations
NetSPI introduced Attack Surface Management to help secure the expanding, global attack surface. The platform delivers continuous pentesting backed by NetSPI’s global …
4 practical strategies for Log4j discovery
For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within …
NetSPI offers protection against cybersecurity threats with IoT penetration testing services
NetSPI launched its IoT penetration testing services, which will be added to its existing suite of penetration, adversary simulation, and attack surface management …
NetSPI raises $90M to fuel innovation, growth, global expansion and product innovation
NetSPI announced it has raised $90 million in growth funding led by KKR, with participation from Ten Eleven Ventures. The investment will be used to further accelerate …
Featured news
Sponsored
Don't miss
- Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
- Triangulation fraud: The costly scam hitting online retailers
- Tracecat: Open-source SOAR
- Why the automotive sector is a target for email-based cyber attacks
- eBook: Do you have what it takes to lead in cybersecurity?