Blog

Discover ethical hacking to understand how to strengthen your organization’s security.
Penetration testing: black box, white box and gray box

Penetration testing: black box, white box and gray box

Penetration testing is an essential process for assessing the robustness of IT systems against cyberattacks. By simulating realistic scenarios, it allows vulnerabilities to be detected before they are exploited by malicious actors. Depending on the information...

How do you perform a penetration test for a web application?

How do you perform a penetration test for a web application?

Creating a penetration test for a web application is a complex process requiring technical skills, a rigorous methodology and in-depth knowledge of current IT threats. The process involves simulating real-life attacks on an online application to assess its resistance...

What is an external pentest?

What is an external pentest?

External pentesting is a technical audit carried out by an offensive security professional, aimed at identifying vulnerabilities accessible from outside the company, i.e. from the Internet, without prior access to internal resources. External Pentest: simulating a...

What are the differences between Red Team and Pentest?

What are the differences between Red Team and Pentest?

Pentest, or penetration testing, and the more global and strategic Red Team exercise, are two methods that belong to the field of offensive cybersecurity. They differ profoundly in terms of their scope, objectives, duration, technical nature and the conditions under...

In-store physical Pentest: feedback on a real case study

In-store physical Pentest: feedback on a real case study

Cybersecurity is not limited to the digital sphere. Physical attacks are also part of the modus operandi used by cybercriminals. The principle is simple: look for a human or material flaw within your company to gain access to your data or disrupt the smooth running of...

Phishing campaign: Are decision-makers vulnerable?

Phishing campaign: Are decision-makers vulnerable?

Phishing: an underestimated threat Cybersecurity is a major issue for companies, and malicious phishing campaigns are among the most frequent threats. Yet corporate decision-makers, including CEOs and CTOs, are sometimes the...

Your security is important to us. What about you?

Take advantage of a free 30-minute functional audit to assess your current situation.