RedTeam Blog

17 MayA Day in The Life Of RedTeam: Security Consultant Q&A


We’re often described as “white hat hackers,” which sounds like we operate in a dark van filled with beeping machines and…

Read More

02 MayBeware The Pitfalls Of DIY Social Engineering


Bad news: cyber criminals are only getting better at what they do. In fact, with ever more data available and the…

Read More

25 AprPenetration Testing vs. Red Teaming: What’s the Difference?


Penetration testing versus Red teaming. We often hear them used interchangeably, but in fact they’re two distinct things. So what exactly…

Read More

04 AprPassword Fail: Half Of Your Network Users Reuse Passwords


Passwords pose a problem—perhaps now more than ever before—for both individuals and for the businesses they interact with or are employed…

Read More

23 MarThe 3 Weak Spots Where Your Doors Are Most Vulnerable… And How To Protect Them


Most security systems make use of multiple, layered security mechanisms meant to reduce the likelihood of a security breach. Yet some…

Read More

15 Mar5 Key Lessons Learned from Critical Infrastructure Cyber Attacks


News of data breaches, phishing attacks, ransomware and other malicious cyber activity shows no sign of abating. Putting a positive spin…

Read More

07 MarThe Evil SVG Project


The purpose of this article is to provide a repeatable means to performing cross-site scripting attacks via a SVG file. SVG,…

Read More

19 FebRedTeam’s Kurt Muhl Achieves SCADA Security Architect Certification


At RedTeam, we strive to help clients maintain compliance within their respective industries to better manage risks and achieve security resilience….

Read More

13 FebThe Top Offensive Security Resources For 2018


Staying abreast of the latest cybersecurity knowledge and informed of top offensive security practices is a challenge. There’s always some new…

Read More

06 FebAmping up PCI Service Provider Compliance


When it comes to compliance testing in the payment card industry, everyone understands the importance of keeping data security standards up…

Read More

Secure Your Organization Today

Contact Us