{"id":2634,"date":"2024-10-18T11:28:21","date_gmt":"2024-10-18T11:28:21","guid":{"rendered":"https:\/\/www.hackmosphere.fr\/home\/"},"modified":"2025-06-19T14:20:26","modified_gmt":"2025-06-19T14:20:26","slug":"home","status":"publish","type":"page","link":"https:\/\/www.hackmosphere.fr\/en\/","title":{"rendered":"Home"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; next_background_color=&#8221;#ffffff&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;137deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/PATTERN-HEADER.png&#8221; background_position=&#8221;top_left&#8221; background_horizontal_offset=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;8vw||10vw||false|false&#8221; custom_padding_tablet=&#8221;15vw||15vw||false|false&#8221; custom_padding_phone=&#8221;15vw||15vw||true|false&#8221; bottom_divider_style=&#8221;asymmetric&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_image_phone=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;d17a7299-b755-4a58-bb4a-50cd1f0ab607&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span style=\"font-weight: 400;\">We care for your security<\/span><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Strengthen your IT security with penetration tests tailored to your objectives and level of maturity. Whether you&#8217;re a start-up or a large enterprise, we can adapt to your specific challenges. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; button_text=&#8221;Contact us&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2072&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_use_color_gradient__hover=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_icon_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#1A1A31&#8243; button_icon_color__hover=&#8221;#1A1A31&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,1_5,1_5,1_5,1_5&#8243; use_custom_gutter=&#8221;on&#8221; make_equal=&#8221;on&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;|20%|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-BUT-blanc.png&#8221; title_text=&#8221;Logo-BUT-white&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-France-Enfance-Prote\u0301ge\u0301e.png&#8221; title_text=&#8221;Logo France Enfance Prot\u00e9g\u00e9e&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-Apria.png&#8221; title_text=&#8221;Apria logo&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;25px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-ERES.png&#8221; title_text=&#8221;ERES logo&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;30px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-Mini-green-power.png&#8221; title_text=&#8221;Mini green power logo&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;20px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; header_2_text_align=&#8221;center&#8221; header_2_text_align_tablet=&#8221;left&#8221; header_2_text_align_phone=&#8221;left&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Our services<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Your safety is our priority<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;88%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Identify and reduce risks to your information systems. Our cristal clear &amp; detailed audit reports enable your technical teams to prioritize and quickly correct vulnerabilities. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4MjkifX0=@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_color=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/pentest-cybersecurite.png&#8221; alt=&#8221;Icon pentest cybersecurite&#8221; title_text=&#8221;Icon pentest cybersecurite&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Pentest cyber<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;95%&#8221; width_tablet=&#8221;95%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Identify your vulnerabilities and strengthen your IT defenses.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4NTUifX0=@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_color=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Icon-Pentest-physique.png&#8221; alt=&#8221;Icon Pentest physical&#8221; title_text=&#8221;Icon Pentest physical&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Physical Pentesting<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Increase the security of your premises against unauthorized intrusion and protect your assets.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4NjYifX0=@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_color=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Phishing.png&#8221; title_text=&#8221;Phishing&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Phishing<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Measure the human risk in the face of cyber-attacks and reinforce your teams&#8217; vigilance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4NzcifX0=@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_color=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Red-team.png&#8221; title_text=&#8221;Red team&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Red teaming<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Test the robustness of your systems, infrastructures and employees.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(173,173,173,0.15)&#8221; custom_padding=&#8221;101px|30px|101px|30px|true|true&#8221; custom_padding_tablet=&#8221;84px|30px|84px|30px|true|true&#8221; custom_padding_phone=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>OUR TRAININGS<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;left&#8221; header_3_text_color=&#8221;#1A1A31&#8243; width=&#8221;69%&#8221; custom_margin=&#8221;||10px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Investing in your training, <\/span><span style=\"font-weight: 400;\">means investing in your safety<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We&#8217;re convinced that ongoing training is the key to staying up to date in the field of cybersecurity. Our training programs are designed to equip you with the skills you need to anticipate, identify and neutralize cyber threats. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4ODcifX0=@&#8221; button_text=&#8221;Explore our training courses&#8221; button_text_tablet=&#8221;Explore our training courses&#8221; button_text_phone=&#8221;Read more&#8221; button_text_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Formations-1.jpg&#8221; title_text=&#8221;Formations-1&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/approche.jpg&#8221; title_text=&#8221;approach&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(173,173,173,0.15)&#8221; custom_padding=&#8221;98px|30px|98px|30px|true|true&#8221; custom_padding_tablet=&#8221;98px|30px|98px|30px|true|true&#8221; custom_padding_phone=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>OUR APPROACH<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;left&#8221; header_3_text_color=&#8221;#1A1A31&#8243; width=&#8221;86%&#8221; custom_margin=&#8221;||10px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Take advantage of our hyper-specialization in pentesting<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We focus our efforts on offensive security and technical aspects to offer you a practical, pragmatic approach. Our hackers are passionate about cybersecurity, and adhere to recognized and ethical standards such as OSSTM and OWASP. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4MjEifX0=@&#8221; button_text=&#8221;Read more&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;||||false|false&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row disabled_on=&#8221;off|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#1A1A31&#8243; header_2_text_align_tablet=&#8221;left&#8221; header_2_text_align_phone=&#8221;left&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>OUR VALUES<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Enjoy a common-sense culture<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;62%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Transparency, expertise and integrity are at the heart of our pentest services, ensuring trust-based collaboration and effective protection of your assets.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; disabled_on=&#8221;off|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; module_alignment_tablet=&#8221;left&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|tablet&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Transparence.png&#8221; title_text=&#8221;Transparency&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Transparency<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We believe in clear and honest communication with our customers.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Expertise.png&#8221; title_text=&#8221;Expertise&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Expertise<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;95%&#8221; width_tablet=&#8221;95%&#8221; width_phone=&#8221;95%&#8221; width_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Our team of experts has over 10 years&#8217; experience in cybersecurity.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Inte\u0301grite\u0301.png&#8221; title_text=&#8221;Integrity&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Integrity<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Our hackers are committed to respecting strict ethical standards and acting responsibly.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; disabled_on=&#8221;on|off|on&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#1A1A31&#8243; header_2_text_align_tablet=&#8221;left&#8221; header_2_text_align_phone=&#8221;left&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>OUR VALUES<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Enjoy a common-sense culture<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;62%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Transparency, expertise and integrity are at the heart of our pentest services, ensuring trust-based collaboration and effective protection of your assets.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Transparence.png&#8221; title_text=&#8221;Transparency&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Transparency<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We believe in clear and honest communication with our customers.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Expertise.png&#8221; title_text=&#8221;Expertise&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Expertise<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;95%&#8221; width_tablet=&#8221;95%&#8221; width_phone=&#8221;95%&#8221; width_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Our team of experts has over 10 years&#8217; experience in cybersecurity.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Inte\u0301grite\u0301.png&#8221; title_text=&#8221;Integrity&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Integrity<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Our hackers are committed to respecting strict ethical standards and acting responsibly.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion open_toggle_text_color=&#8221;#01DC94&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#1A1A31&#8243; toggle_level=&#8221;h2&#8243; toggle_font_size=&#8221;18px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_accordion_item title=&#8221;What is an ethical hacker?&#8221; open_toggle_text_color=&#8221;#01DC94&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; toggle_level=&#8221;h2&#8243; toggle_font_size=&#8221;19px&#8221; open=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">The ethical hacker is first and foremost a high-level technical expert, with a solid knowledge of network architectures, operating systems, web applications, communication protocols and emerging technologies. He uses this expertise to simulate real-life attacks, assess the robustness of protection mechanisms, and help companies correct weaknesses before a malicious actor takes advantage of them.<\/p>\n<p style=\"text-align: justify;\">Unlike the hacker, the ethical hacker acts with the explicit authorization of the target, within a precise contractual framework, often accompanied by a charter of ethics. They may intervene as part of a pentest, a security audit, a bug bounty program, or during Red Team exercises. He works closely with in-house cybersecurity teams, developers, IT managers and decision-makers to translate technical findings into concrete corrective action.<\/p>\n<p style=\"text-align: justify;\">His posture is both offensive in approach and defensive in objective, as he seeks not to harm, but to prevent risks by adopting the methods of attackers to better counter them.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What techniques does an ethical hacker use?&#8221; open=&#8221;off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">To identify vulnerabilities and test the robustness of systems, the ethical hacker uses a panoply of advanced techniques drawn from the world of hacking, but deployed within an ethical framework. These techniques cover the entire cycle of a potential attack, from the passive reconnaissance phase, which involves collecting public information on the target via tools such as Whois, Shodan or Maltego, to active reconnaissance, with port scanning, fingerprinting and service mapping. Next comes the identification of technical vulnerabilities, using scanners such as Nmap, Nessus or Burp Suite, then the exploitation phase, where the professional seeks to exploit the identified flaws via frameworks such as Metasploit, the Impacket suite or customized scripts. Logical attacks can also be used, such as SQL injection, XSS attacks, request forgery (CSRF, SSRF), session mismanagement or elevation of privileges. Social engineering is also used, notably to test human resistance via phishing campaigns or pretexting scenarios. The ethical hacker even goes so far as to document all his or her actions, in order to produce a comprehensive and educational report for the organization, highlighting vulnerabilities, possible compromise scenarios, associated risks and remediation recommendations.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What standards apply?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">The business of ethical hacking falls within a strict regulatory and standards framework, designed to provide a framework for practices and guarantee irreproachable ethics. Several international standards define best practice in penetration testing and offensive security. Among them, the PTES (Penetration Testing Execution Standard) establishes a comprehensive methodology covering preparation, recognition, exploitation, post-exploitation and restitution. The OWASP, meanwhile, provides specific guides for web applications, such as the famous Top 10 vulnerabilities, widely used for application testing. ISO\/IEC 27001 is the benchmark for information security management systems, while ISO\/IEC 27002 details the security measures to be implemented. Professional certifications play a key role in the recognition of offensive cybersecurity skills. Among the most highly-regarded today by professionals in the field are those offered by Altered Security (such as the CRTP, focused on Active Directory pentesting, or the CRTE, red team lab-oriented), as well as those of Certified Secure, notably the CRTO (Certified Red Team Operator), widely recognized for its technicality and its anchoring in realistic scenarios. These certifications attest to a high level of competence, ethical commitment and ability to operate in a variety of contexts. They are often required in invitations to tender or on critical projects to validate the qualifications of participants.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What are the responsibilities of an ethical hacker?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Ethical hackers work on the basis of contractual trust, where technical rigor must go hand in hand with irreproachable probity. He is bound by strict obligations of confidentiality, respect for data, non-disclosure of sensitive information and non-execution of malicious code outside the scope of authorized use. He must always take care to limit the impact of his actions, to avoid disrupting the company&#8217;s critical services, to inform immediately of any major flaw discovered, and to scrupulously respect the scope of the mission defined upstream. This professional ethic is at the heart of the hacker&#8217;s legitimacy and credibility with companies. The ethical hacker is also a knowledge broker, helping to raise the level of vigilance of in-house teams, reinforce the security culture, and disseminate secure development practices. His expertise contributes to the emergence of a more anticipatory cybersecurity approach, less dependent on technical solutions and more rooted in a detailed understanding of attack mechanisms. Its role is as much technical as it is strategic, in the service of a more resilient digital ecosystem, capable of dealing with attacks swiftly, discerningly and effectively.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_text_color=&#8221;#1A1A31&#8243; text_font_size=&#8221;20px&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>OUR EXPERTISE &#8211; BLOG ARTICLES<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#1A1A31&#8243; text_font_size=&#8221;20px&#8221; z_index=&#8221;0&#8243; text_orientation=&#8221;center&#8221; custom_margin=&#8221;-25px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Advice on cybersecurity<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;1686.3px&#8221; custom_margin=&#8221;-100px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; include_categories=&#8221;all&#8221; use_manual_excerpt=&#8221;off&#8221; excerpt_length=&#8221;100&#8243; show_more=&#8221;on&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_categories=&#8221;off&#8221; show_excerpt=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;311deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; custom_margin=&#8221;||-1px||false|false&#8221; custom_padding=&#8221;||6vw||false|false&#8221; custom_padding_tablet=&#8221;||6vw||false|false&#8221; custom_padding_phone=&#8221;20px||80px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;ff23644c-5b83-43e2-8264-0ce4167ad132&#8243; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#FCFCFC&#8221; header_2_text_color=&#8221;#FCFCFC&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>TESTIMONIALS<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;left&#8221; header_3_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||10px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">They trust us<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Find out how our ethical hackers made the difference.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;#B7F7CC&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;#0B4650&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||-5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>MICKAEL L.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; text_text_color=&#8221;rgba(183,247,204,0.5)&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>CHACK<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>&#8220;Hackmosphere accompanied us to a major customer, where we carried out over 15 days of auditing and pentesting. Their expertise as ethical hackers enabled us to deliver a high-quality service to our customer. What&#8217;s more, they made themselves readily available, despite the distance.&#8221;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;#B7F7CC&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;#0B4650&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||-5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>CL\u00c9MENT G.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; text_text_color=&#8221;rgba(183,247,204,0.5)&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>CESI Angoul\u00eame<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>&#8220;Hackmosphere is involved in our Masters degree training courses on the subject of Pentest. Florian is particularly appreciated by learners for his dynamism and his technical mastery of the subjects covered. He is always available to support us in the development of this subject.&#8221;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;#B7F7CC&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;#0B4650&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||-5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>RICCARDO G.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; text_text_color=&#8221;rgba(183,247,204,0.5)&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>ARCUM<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>&#8220;Florian works very effectively on audit and recommendation assignments for e-commerce sites, as well as on mission-critical applications, in the e-health sector for example, while offering fair rates. It&#8217;s always a pleasure to work with him.&#8221;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_6,1_6,1_6,1_6,1_6,1_6&#8243; make_equal=&#8221;on&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;https:\/\/www.france-enfance-protegee.fr\/&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-France-Enfance-Prote\u0301ge\u0301e.png&#8221; title_text=&#8221;Logo France Enfance Prot\u00e9g\u00e9e&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;https:\/\/www.eres-group.com\/&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-ERES.png&#8221; title_text=&#8221;ERES logo&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;30px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;https:\/\/www.lancey.fr\/&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-LANCEY.png&#8221; title_text=&#8221;LANCEY logo&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;15px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;https:\/\/www.lizee.co\/&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-Lizee.png&#8221; title_text=&#8221;Lizee logo&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;15px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;https:\/\/www.minigreenpower.com\/&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Logo-Mini-green-power.png&#8221; title_text=&#8221;Mini green power logo&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;20px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;https:\/\/www.s3pweb.com\/&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/S3Pweb.png&#8221; title_text=&#8221;S3Pweb&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;24px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(252,252,252,0.15)&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/CTA.png&#8221; custom_margin=&#8221;70px||||false|false&#8221; custom_padding=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_tablet=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_phone=&#8221;30px|20px|30px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"font-weight: 400;\">Your security is important to us. What about you?  <\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-20px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Take advantage of a free 30-minute functional audit to assess your current situation.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; button_text=&#8221;Contact us&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2072&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_use_color_gradient__hover=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_icon_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#1A1A31&#8243; button_icon_color__hover=&#8221;#1A1A31&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We care for your securityStrengthen your IT security with penetration tests tailored to your objectives and level of maturity. Whether you&#8217;re a start-up or a large enterprise, we can adapt to your specific challenges. Our servicesYour safety is our priorityIdentify and reduce risks to your information systems. Our cristal clear &amp; detailed audit reports enable [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"Hackmosphere l We care for your security","_seopress_titles_desc":"Use our team of ethical hackers and strengthen your IT security with penetration tests tailored to your objectives.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2634","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/comments?post=2634"}],"version-history":[{"count":14,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2634\/revisions"}],"predecessor-version":[{"id":3431,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2634\/revisions\/3431"}],"wp:attachment":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/media?parent=2634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}