Cyber Security FAQs

Email Phishing Attacks Explained

What is Phishing? Phishing is a type of social engineering cyberattack that uses email as a delivery method with an aim to coerce users into performing actions that…

Read more

What is a Red Team Engagement?

A red-team engagement is an advanced form of cybersecurity assessment where a team of ethical hackers, known as the red team, simulates a full-scale cyberattack on an organisation….

Read more

What is Penetration Testing?

Penetration testing, sometimes known as “pen testing”, “pentesting”, or “ethical hacking”, is a cybersecurity practice in which ethical hackers simulate actual attacks on a network, web application, computer…

Read more

What is Vulnerability Scanning?

Vulnerability scanning is a process used to identify security weaknesses and vulnerabilities in computer systems, servers, networks, or applications. It is often performed as part of a vulnerability…

Read more