Glossary

Application-level attacks are those attacks that exploit weaknesses with a program itself rather than its underlying infrastructure.

graphic

What is an Application-level Attack?

Application-level attacks are those attacks that exploit weaknesses with a program itself rather than its underlying infrastructure.

A Wi-Fi router

What is Wi-Fi Penetration Testing?

Many people in a home or work environment these days have laptops and mobile phones which need to connect to…

Woman walking with phone in hand

Application Penetration Testing

Cloud graphic

What is Penetration Testing as a Service (PTaaS)?

Penetration Testing as a Service (PTaaS), which is more commonly shortened to ‘Pen Test as a Service’ is the delivery…

Engineer with a yellow hard hat working in a server room

What is Intrusive Penetration Testing?

Intrusive Penetration Testing is Penetration Testing where the risk of potential system impact or outage is not mitigated. For example,…

Two people at a desk typing on laptops

Office 365 Security Best Practices

Although Microsoft 365 has many built-in security features which can make the environment safe against attackers, this relies heavily on…

A graphic with numbers

Sniffing Attack

Sniffing is the technique or process of capturing (sniffing) data packets over a network. It is historically related to the…

A server room

DevOps vs DevSecOps

Development Operations (DevOps) and Development Security Operations (DevSecOps) although share similar principles have slightly different areas for concern.

Man with a mask trying to break into a car

What is Session Hijacking?

Session hijacking is an attack that consists of exploiting the web applications users' session control in order to impersonate other…