Compliance means proving your security controls work in the real world—and network penetration testing provides the evidence to back it up.| Vonahi Security's Blog
Discover how Grey Box Penetration Testing exposes real-world security risks from stolen credentials. Learn how automated solutions like vPenTest help organizations detect privilege escalation, weak permissions, and insider threats—before attackers do.| Vonahi Security's Blog
Penetration testing is a digital stress test where ethical hackers simulate cyberattacks to uncover vulnerabilities. Learn about 8 types of tests, when to use them, and how often to schedule them to protect your business. Simplify the process and make informed security decisions.| Vonahi Security's Blog
Stay secure with regular network penetration testing. Learn about internal vs. external tests and how vPenTest makes frequent testing easy and affordable.| Vonahi Security's Blog
Learn how the NIS2 Directive emphasizes regular penetration testing to strengthen cybersecurity, identify vulnerabilities, and ensure compliance across Europe.| Vonahi Security's Blog
The cyber threat landscape is constantly shifting, making it harder for MSPs to deliver top-notch security services while growing revenue. But thanks to advances in automation, MSPs now have the tools to offer scalable, efficient, and profitable cybersecurity services like never before—especially with penetration testing. How Automation is Transforming| Vonahi Security's Blog
Vonahi is changing the game, making regular penetration testing easy, affordable and highly effective| Vonahi Security's Blog
Vonahi Security wins Channel Program's Best July Pitch and sets the record for the most demo requests and product reviews.| Vonahi Security's Blog
At Vonahi Security, we believe every one deserves to be supported and encouraged to be unique individuals. We strive to create a welcoming and inclusive environment for all, driven by behavior that shows empathy, respect, and care for others. We stand by the Respect in Security pledge.| Vonahi Security's Blog
This blog discusses a DLL hijacking vulnerability affecting all versions of Windows Server 2012 (but not Server 2012 R2). This 0-day vulnerability can be exploited for privilege escalation by any regular user and does not require a system reboot, yet it will not be patched by Microsoft.| Vonahi Security's Blog
Earlier this year, our threat researcher found three easily exploitable vulnerabilities in CMS apps, including two that could result in remote code execution (RCE). This article combines write-ups for these vulnerabilities.| Vonahi Security's Blog
Here's a quick workaround for when you get rate limited during a password attack against the SMB service.| Vonahi Security's Blog
Automation is a potential game-changer for offensive security in 2020. Let's explore some of the benefits for CISOs.| Vonahi Security's Blog
Reflections on a few major cybersecurity developments of 2019, and on how these will shape the industry in 2020.| Vonahi Security's Blog
A closer look at 5 most common variants of holiday cyber attacks.| Vonahi Security's Blog
From phishing and BEC to evasive spear phishing and VEC + tips on what you can do to defend against these sophisticated attacks.| Vonahi Security's Blog
In today’s challenging economy, no company can afford to fall victim to cybersecurity trouble like a cyberattack or data breach. Companies can invest in a wide array of cybersecurity solutions to help safeguard their networks and data, but how can they be sure that they’re making the right| Vonahi Security's Blog
Earlier this year our threat researcher found a DLL hijacking flaw affecting Philips SmartControl (CVE-2020-7360). Our latest blog post combines a write-up of this vulnerability with a general introduction to DLL hijacking for infosec students.| Vonahi Security's Blog