• Facebook
  • Twitter
  • Instagram
  • Linkedin
  • Youtube
  • Home
  • Products
    • RidgeBot Overview
    • Methodology: Penetration Testing
    • Methodology: Adversary Cyber Emulation
    • 10 RidgeBot Features
    • Surviving Ransomware
    • Post Exploitation
    • OWASP Top 10 Compliance
    • Apache log4j Vulnerability
    • MSSP/MDR Solution
  • Resources
  • Use Cases
  • Partners
    • Overview
    • Technology Partners
    • Partner Portal Login
  • Services
  • Blog
  • About Us
  • English
    • Español
    • Português
    • Italiano
Select Page
Replace Blind Trust in Cybersecurity with Continuous Threat Exposure Management

Replace Blind Trust in Cybersecurity with Continuous Threat Exposure Management

by Lydia Zhang | Sep 12, 2022 | Pen Test Technical Tips

Traditional vulnerability management approaches can no longer keep up with today’s dynamically changing business needs and attack surfaces that are expanding across clouds, remote workers, IoT, and mobile users. Ad hoc measures, emergency patches, and even...
Things you should do to defend against wild hackers in 2022

Things you should do to defend against wild hackers in 2022

by Lydia Zhang | Feb 24, 2022 | AI in Automated Pen Test

According to IBM’s Cost of a Data Breach Report, the average total cost of a data breach increased approximately 10% between 2020 and 2021, “the largest single year cost increase in the last seven years.” The study points to several factors that helped mitigate the...
Keep the Windows of Opportunity Closed for Hackers

Keep the Windows of Opportunity Closed for Hackers

by Lydia Zhang | Jan 25, 2022 | Pen Test Technical Tips

We’ve all read the headlines about the recent online banking scam that hit a bank in the Philippines. The investigation into the scam is still on-going, with findings being revealed before the end of the month. The incident...
How to achieve an optimal pentest result by using “flow control”

How to achieve an optimal pentest result by using “flow control”

by Lydia Zhang | Nov 23, 2021 | Automated Pen Test Demo

This video demonstrates how the newly added “Flow Control” feature help you achieve a better penetration testing result. Starting from the release of RidgeBot 3.7, when a new task is created, you can choose RidgeBot’s stealth level which is the attack speed from one...
What is the right way to detect OS by using SMB?

What is the right way to detect OS by using SMB?

by Lydia Zhang | Sep 29, 2021 | Pen Test Technical Tips

After studying different vendors’ approaches, here is our summary of how to do SMB OS detection right. With either SMBv1 or SMBv2, both “Session Setup Request “and “NTLMSSP_NEGOTIATE requests” shall be sent;Especially for SMB v1, if only “Session Setup AndX Request”...
« Older Entries

Recent Posts

  • RidgeBot Automated Pentesting Strengthens Security Across the DevSecOps SDLC
  • Eliminate Ransomware Lurking Within Your IT Environment
  • Why Are Insider Threats on the Rise?
  • How to Implement a Risk-Based Approach to Cybersecurity
  • Overconfidence in Technology Can Promote a Costly False Sense of Security

Archives

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • July 2019
  • April 2019

RidgeSecurity.ai

  • Home
  • Products
  • Resources
  • Use Cases
  • Partners
  • Services
  • Blog
  • About Us
© 2023 Ridge Security, Inc.    Privacy Policy   Terms and Conditions