Nov. 23, 2023, 2:19 a.m. | Daniel Dalalana Bertoglio, Arthur Gil, Juan Acosta, Julia Godoy, Roben Castagna Lunardi, Avelino Francisco Zorzo

cs.CR updates on arXiv.org arxiv.org

With the increasing number of internet-based resources and applications, the
amount of attacks faced by companies has increased significantly in the past
years. Likewise, the techniques to test security and emulate attacks need to be
constantly improved and, as a consequence, help to mitigate attacks. Among
these techniques, penetration test (Pentest) provides methods to assess the
security posture of assets, using different tools and methodologies applied in
specific scenarios. Therefore, this study aims to present current
methodologies, tools, and potential …

applications attacks challenges companies internet penetration penetration test pentest resources security techniques test

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom