Blog
What is a cyber pentest and what is its purpose?
What is a Pentest? Pentesting in cybersecurity is more than just a theoretical analysis of system configurations; it is based on a logic of offensive experimentation. It is a controlled process in which a security expert, called a pentester, acts as a malicious hacker...
Industrial Pentest: How can it help you identify and correct vulnerabilities?
In the complex world of industrial systems, security is a crucial priority. Have you ever considered the potential vulnerabilities that could compromise the robustness of your infrastructure? That's what we're going to look at in this blog post. But first, imagine:...
What are the differences between Pentest Black Box, White Box and Grey Box?
Pentest can be carried out in different modes: Black Box, White Box or Grey Box. Each of these scenarios has very distinct characteristics, which influence the analysis method, the scope of the assessment, the accuracy of the results obtained and the strategic purpose...
What are the differences between Red Team and Pentest?
Pentest, or penetration testing, and the more global and strategic Red Team exercise, are two methods that belong to the field of offensive cybersecurity. They differ profoundly in terms of their scope, objectives, duration, technical nature and the conditions under...
How can you protect your business from cyber attacks?
The Hiscox 2023 report(https://www.hiscox.fr/courtage/blog/rapport-hiscox-2023-sur-la-gestion-des-cyber-risques) highlights an alarming reality: 53% of companies reported having suffered at least one cyber attack in 2023. This includes small businesses, 36% of which...
Bypassing Windows Defender antivirus in 2025: Evasion Techniques Using Direct Syscalls and XOR Encryption – Part 1
Reading Time: 10 minutesTechnical Level: Advanced Introduction As pentesters, we always have to keep up to date with the latest trends and of course, bypassing antiviruses is part of our activities. In this article, we will discuss how to bypass antiviruses and since...
How to obtain a time-based blind SQL injection and automate by modifying SQLMAP?
The cybersecurity of web applications is a crucial issue in a world where digital data has become a major asset. Among the most subtle threats, "time-based blind SQL injection" vulnerabilities stand out for their ability to exfiltrate data without triggering obvious...
Your security is important to us. What about you?
Take advantage of a free 30-minute functional audit to assess your current situation.