www.soundshore.nethubfssoundshore-siteheader-img-2

The Next Level Network Blog

IT Management, Security, Compliance for Regulated Firms

Penetration Testing Tools: In Hackers’ Hands New Modlishka Tool is a Cyber Security Threat

Apr 25, 2019 9:00:00 AM / by Jennifer Valle, Director of Marketing and Operations posted in cyber security, penetration testing, phishing, multi-factor authentication, Modlishka

0 Comments

Can Overcome Multi-factor Authentication and Enable Phishing

As a basic element of cyber security programs, penetration testing is standard protocol for detecting possible IT network vulnerabilities. There are many penetration testing tools available that simulate hacker attacks to discover cracks in firewalls and other defenses. Developers are constantly building new tools to keep up with evolving threats and the measures put in place to avert them.

Read More

Recent DOJ Hacker Charges a Reminder: Do Network Penetration Testing, Patching for Cyber Security

Sep 27, 2018 8:30:00 AM / by Eric Benda, CEO posted in cyber security, assessment, penetration testing

0 Comments

Earlier this month, the U.S. Department of Justice filed charges against a N. Korean hacker who they say was behind such infamous incidents as the WannaCry ransomware attack, the attack on SONY over its release of a film unfavorable to N. Korean leader Kim Jung Un, and the $81 million Bangladesh Bank heist.

The DOJ’s action is a reminder that businesses are vulnerable and must take proactive steps to assure cyber security – especially regulated companies. These steps include network penetration testing, ongoing identification and patching of software and network vulnerabilities and other measures.

Read More