For pentester
What is the difference between Penetration Testing and Vulnerability Assessment?
In the dictionary universe of security assessment forms, Penetration Testing and Vulnerability Assessment are considered to be the two familiar and typical techniques that are most used. Although the functions, methods and implementation techniques may be different, in terms of final results, both methods aim to evaluate the security strength of the system. To make…
Security assessment is necessary for which types of businesses?
Enter the digital era, the top concern of businesses is information security. It could be said that security assessment is the top priority that every business that wants to undergo digital transformation needs to do, especially in industries with high-value industries, with exceptional growth rates and a large volume of customer data. Typically businesses in…
Distinguishing Between Pentest and Red Team
In the area of security, the terms Pentest and Red Team are often used interchangeably. So, what is the distinction between these two terms? We’ll discuss in this article to assist you learn more about which service would be the greatest fit for your organization. Penetration Testing: Pentester is someone who has hacker-like abilities and…
5 subdomain scanners to assist the pentest process
In recent years, finding subdomains has become an important part of the pentest process. This mission usually takes time and effort. However, the development of digital technology platforms has provided us with effective tools. This article will outline 5 subdomain scanners to assist in the pentest process. Outstanding methods for finding subdomains The finding of…
The path from zero to a skilled pentester (part 1)
Perhaps this topic is the one that really impresses me. It’s October, the month that I feel warm and ambitious. This is the sharing of my personal opinion, so if you have different ideas, please feel welcome to email me to discuss I started as an IT specialist but security is my passion. I used…
Efficient use of Pentest – What did VSEC expert say?
Webinar: “Stay Ahead of Cyber Threats” On March 29, the event “Stay Ahead of Cyber Threats,” organized by Vietnamese Security Network JSC in collaboration with VNG Cloud, was successfully held and left positive impressions on the Vietnamese Tech and business communities. The event featured speakers from renowned cybersecurity institutions, such as Kaspersky, VNG Cloud, VSEC,…