January 27, 2021 — Penetration testing
How to Combine Vulnerability Management & Penetration Testing
What is what and how are these two methods used together? Holm Security explains the methods. Vulnerability management and penetration testing are both very important methods to maintain a high level of IT security in your organization. But when should you...
May 13, 2020 — Security tricks & trends
Security Risks Working from Home
January 17, 2020 — Security tricks & trends
Cyber Security Predictions 2020
Password Spraying & Credential Stuffing An often recurring question I get asked is: “When...
August 29, 2019 — Hacker attacks & exploits
How a Cyber Weapon is Made
The Delivery Mechanism This part of the cyber weapon ensures it hits its target - or...
January 30, 2019 — Security tricks & trends
Cyber Security Predictions in 2019
Web Scraping of Credit Cards Last year, several different e-retailers' credit card forms, on their web pages, were hijacked. Where JavaScript was injected,...
October 2, 2018 — Hacker attacks & exploits
10 Different Ways an Attacker Can Put in Backdoors in IT Systems
1. Simply a Programming Error? If you get a developer to set up a back door. It can be so subtle, you might mistake it for a programming error. Occasionally,...