Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.


What is Broken Authentication?
Broken authentication refers to a weakness in the design or implementation of access controls inherent in an online platform or…

What is the Information Security CIA?
The CIA triad is a security model of three core principles used within IT security and Information Security policies within…

Is Linux Good for Ethical Hacking?
Linux is commonly the preferred operating system used by Ethical Hackers and 'Infosec' professionals due to the following factors.

Is Open Source or Proprietary More Secure?
Open-source software projects are, in theory, more secure than closed-source/proprietary software due to the clear disclosure of security vulnerabilities and…

What is a Physical Penetration Test?
A physical penetration test (pen test) is where an ethical hacker or social engineer will try to gain entry to…

Why is Python Used for Hacking?
Python is well-known as a fast, simple and easy, readable scripting or programming language. Those features make Python one of…

How Secure are TPM Chips?
This article demonstrates that the security of BitLocker for full disk encryption - when deployed in conjunction with Trusted Platform…

What is an Android Pentest?
Penetration testing an Android application involves both the application operation, similar to how a web application test is performed through…

What is Cloud Pentesting?
Cloud Penetration Testing or 'Pentesting' typically refers to the testing of a Cloud-hosted environment such as against Amazon Web Services…