PPI Principals of GDPR for Small Businesses: Navigating Data Protection

“So, all we have to do to implement these 11 chapters containing 91 articles in 261 pages of data protection regulation and all our worries about our clients, staff and suppliers’ Personally Identifiable Information (PPI) will be over?” “Yes, that’s it.” “Jess how long have you worked here?” “Erm, 20 years since last spring. “ […]

Importance of Black Box Testing for Your Cyber Security Defence

In a world where the digital landscape keeps changing, how can we effectively protect our organisations from threats? This is a question with no one-size-fits-all answer as there are various tactics to protect your systems. However, we will be focusing on the use of black box penetration testing to identify weaknesses within your systems or […]

External Penetration Testing and How to Do It

What is External Penetration Testing External penetration testing also known as external network penetration testing helps to assess the security organisation’s online presence and evaluate the effectiveness of its public-facing systems. The primary objective of this testing is to simulate real-world cyber threats originating from anywhere in the world, with ethical hackers acting as external […]

Improper Access Control in DEPUSDT_LEVUSDC protocol

Title: Improper Access Control in DEPUSDT_LEVUSDC Protocol  Date: 15/06/2023  Link: https://twitter.com/1nf0s3cpt/status/1669624223059546112?s=46  An attack has occurred on the $DEPUSDT token on the Ethereum blockchain, leading to a significant loss of approximately $69,000. Additionally, the attacker also targeted the $LEVUSDC token, resulting in a loss of approximately $36,000.  The attack was made possible due to the existence […]

Enhancing the Security in Blockchain | Risk Crew

The Emergence of Blockchain Technology  How did we arrive at blockchain technology? Let’s start from the beginning. The internet, which has been in existence for over 60 years, is built on the TCP/IP and OSI model stack. Originally designed for information sharing through the client-server model, the internet has evolved into a powerful technology that […]

Why a Red Team Security Assessment is Crucial for Every Business

In today’s digital age, businesses are more vulnerable than ever to cyber-attacks. As a result, organisations must take a proactive approach to their cyber security measures to ensure that they are adequately protected. One of the most effective methods of assessing a company’s security posture is through red teaming. A Red Team Security Assessment (aka: […]

How Much Does Penetration Testing Cost | Risk Crew

Penetration Testing Cost Penetration testing, also known as ethical hacking or white-hat hacking, is like putting on a hacker’s hat (but with authorisation!) to test the security of a computer system, network, or application for vulnerabilities and weaknesses. The goal is to evaluate how secure the system is and how effective its defences are in […]

Risk Crew