EUNO.NEWS EUNO.NEWS
  • All (20931) +237
  • AI (3154) +13
  • DevOps (932) +6
  • Software (11018) +167
  • IT (5778) +50
  • Education (48)
  • Notice
  • All (20931) +237
    • AI (3154) +13
    • DevOps (932) +6
    • Software (11018) +167
    • IT (5778) +50
    • Education (48)
  • Notice
  • All (20931) +237
  • AI (3154) +13
  • DevOps (932) +6
  • Software (11018) +167
  • IT (5778) +50
  • Education (48)
  • Notice
Sources Tags Search
한국어 English 中文
  • 3 days ago · it

    S2W, CTI 기반 모의해킹 확대…‘인증’ 넘어 ‘실전 점검’으로

    빅데이터 분석 인공지능AI 기업 에스투더블유대표 서상덕, 이하 S2W는 사이버 위협 인텔리전스CTI 역량을 접목한 ‘모의해킹’ 사업을 확대하고 있다. 양종헌 S2W 오펜시브연구팀장은 모의해킹을 “미슐랭 3스타인증를 받은 식당이 훌륭한 식당인 건 맞지만, 그 사실만으로 위생 상태실제로 보...

    #penetration testing #CTI #cybersecurity #S2W #mock hacking #threat intelligence
  • 2 weeks ago · it

    Understanding Red Team Operations: A Technical Deep Dive

    Originally published at Cyberpathhttps://cyberpath-hq.com/blog/red-team-operations-technical-deep-dive?utm_source=dev.to&utm_medium=devto&utm_campaign=Understan...

    #red teaming #penetration testing #cybersecurity #threat simulation #incident response #security assessment
  • 3 weeks ago · it

    The Gap Between Compliance-Driven Pentesting and Real Security

    Penetration testing has become a standard part of modern security programs Most organizations run it to meet compliance requirements, satisfy auditors, and sho...

    #penetration testing #compliance #cybersecurity #audits #security gaps #vulnerability assessment
  • 3 weeks ago · software

    LanManVan: My Journey Building a Modular Security Framework in Go

    Introduction A few months ago I started working on a personal project to create a flexible and powerful tool for security research and penetration testing. I w...

    #go #security #penetration-testing #cli #modular-framework #open-source #network-tools #concurrency
  • 3 weeks ago · it

    Cybersecurity ProxyChains: A Mask of Anonymity

    Maintaining anonymity when performing offensive operations or security assessments is essential in the dynamic field of cybersecurity. Routing traffic through s...

    #proxychains #cybersecurity #anonymity #penetration-testing #linux
  • 1 month ago · software

    Quality Assurance Strategy untuk Modul Reply

    Problem Statement: Mengapa Testing Tools Penting? Sebelum implementasi tools modern, tim menghadapi tantangan klasik dalam QA. Masalah yang Dihadapi | Masalah...

    #quality assurance #testing #k6 #stress testing #penetration testing #OWASP #BDD #Behave #software testing tools
  • 1 month ago · it

    Leaky Bucket: Full Attack Chain Against Public S3-Compatible Buckets in Yandex Cloud

    !Cover image for Leaky Bucket: Full Attack Chain Against Public S3-Compatible Buckets in Yandex Cloudhttps://media2.dev.to/dynamic/image/width=1000,height=420,f...

    #Yandex Cloud #S3-compatible buckets #cloud storage security #leaky bucket vulnerability #penetration testing #red teaming #cloud security
  • 1 month ago · it

    2025 Mobile Security Toolkit Retrospective & The 2026 Evolution: Why Legacy RATs Are Obsolete

    Introduction: The Shifting Landscape As 2025 closes, the landscape of mobile security testing and research tools has undergone a seismic shift. Tools once cons...

    #mobile security #Android #RAT #penetration testing #security toolkit #malware #Google Play Protect #Wuzen Security Suite
  • 1 month ago · it

    Best Beginner’s Guide For Cybersecurity Recon with Python

    Cybersecurity reconnaissance is the first and most critical step in understanding a target’s digital footprint. As a beginner, knowing where to look, how to loo...

    #cybersecurity #reconnaissance #python #penetration testing #OSINT
  • 1 month ago · it

    🛡️Penetration Testing Services Agreement (Beginner-Friendly Guide + Open Template)

    Penetration testing is one of the most exciting areas of cybersecurity, but before any testing begins you must have clear authorization, documented scope, and w...

    #penetration testing #ethical hacking #cybersecurity #security agreement #legal template #open source
EUNO.NEWS
RSS GitHub © 2026