top of page
CONSULT US
E-LEARNING
Our Solutions
Security Architecture
Security Testing
Audit, Risk & Compliance
AppSec / DevSecOps
Phishing & eLearning SaaS Platform
Cyber Essentials Certification
RISQS Verified
Case Studies
OT Cyber Security
Blog
More
Use tab to navigate through the menu items.
Our Blog
Subscribe to get exclusive updates
Join our email list and get access to specials deals, news and many more exclusive
to our subscribers.
Enter your email here
Join Our Mailing List
Thanks for submitting!
All Posts
Architecture
ransomware
Cyber Railways
Critical National Infrastructure
Cybersecurity Framework
Security Governance
Asset Mgmt.
Cloud Security
Cybersecurity
Audit, Risk and Compliance
Complete Cyber's News
Cyberattacks
8 Uncommon Penetration Testing Techniques You Might Never Heard Of
You might know XSS or Buffer overflows, but have you heard of Timing attacks, Subdomain takeover, cache poisioning? Let's deep dive with us on 8 uncommon penetration testing techniques you might never heard of.
Giovanni Setyawan
2 days ago
3 min read
Recent Global CrowdStrike Outage Affected Microsoft, Gmail, Visa, and Banking Companies
In a Recent Global CrowdStrike Outage Affected Microsoft 365
Giovanni Setyawan
Jul 19, 2024
2 min read
Indonesia Faces Major Cybersecurity Breach 2024: Over 100 Government Institutions Affected
A new update on Indonesia's Cybersecurity Breach 2024
Giovanni Setyawan
Jul 4, 2024
3 min read
bottom of page