• Facebook
  • Twitter
  • Instagram
  • Linkedin
  • Youtube
  • Home
  • Products
    • RidgeBot Overview
    • Methodology: Penetration Testing
    • Methodology: Adversary Cyber Emulation
    • 10 RidgeBot Features
    • Surviving Ransomware
    • Post Exploitation
    • OWASP Top 10 Compliance
    • Apache log4j Vulnerability
    • MSSP/MDR Solution
  • Resources
  • Use Cases
  • Partners
    • Overview
    • Technology Partners
    • Partner Portal Login
  • Services
  • Blog
  • About Us
  • English
    • Español
    • Português
    • Italiano
Select Page
How to achieve an optimal pentest result by using “flow control”

How to achieve an optimal pentest result by using “flow control”

by Lydia Zhang | Nov 23, 2021 | Automated Pen Test Demo

This video demonstrates how the newly added “Flow Control” feature help you achieve a better penetration testing result. Starting from the release of RidgeBot 3.7, when a new task is created, you can choose RidgeBot’s stealth level which is the attack speed from one...
Security Test Report with Zero-False Positive Findings

Security Test Report with Zero-False Positive Findings

by Ridge Security Marketing | Jun 17, 2020 | Automated Pen Test Demo

The test report might be the least favorite topic for many penetration testers, but no doubt the most important thing to take care. It often uses 40%-50% of a tester’s time during a penetration test engagement. In this video, we’ll show you how RidgeBot...
Demonstration of an Iterative Attack to MYSQL server with RidgeBot  – a fully automated penetration testing system

Demonstration of an Iterative Attack to MYSQL server with RidgeBot – a fully automated penetration testing system

by Ridge Security Marketing | May 18, 2020 | Automated Pen Test Demo

Many exploit tools available today are only able to take one-step attack at a time. In order to achieve a multi-layered or iterative attack, Pen testers need to link the dots and command the system. Unlike these tools, RidgeBot, a fully automated penentration testing...
End Covid-19, End Weak Passwords

End Covid-19, End Weak Passwords

by Ridge Security Marketing | May 6, 2020 | Automated Pen Test Demo

On April 22nd, Washington Post reported nearly 25,000 email addresses and passwords allegedly from NIH, WHO, Gates Foundation, and others, are dumped online. According to a cybersecurity expert, 48 people from WHO have ‘password’ as their password. Others had used...

Recent Posts

  • Overconfidence in Technology Can Promote a Costly False Sense of Security
  • Automated Pentesting is Your Scalable, Cost-Effective Virtual Red Team
  • Dangerous CVEs Are Increasing Security Risks in the Healthcare Industry
  • How’s Your Digital Serve?
  • Replace Blind Trust in Cybersecurity with Continuous Threat Exposure Management

Archives

  • January 2023
  • December 2022
  • November 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • July 2019
  • April 2019

RidgeSecurity.ai

  • Home
  • Products
  • Resources
  • Use Cases
  • Partners
  • Services
  • Blog
  • About Us
© 2023 Ridge Security, Inc.    Privacy Policy   Terms and Conditions