by Alexander | 26 February 2025
A payload refers to the part of a piece of malicious software (malware) that performs the actual malicious action or malicious objective of an attack. In other words, it is the component of the malware that carries the "load" of the attack and directly causes the damage or undesirable effects on the target system.
by Alexander | 21 March 2025
PCI DSS (Payment Card Industry Data Security Standard) is an international security standard established by the PCI Security Standards Council (PCI SSC), founded in 2006 by American Express, Discover, JCB International, Mastercard and Visa. It aims to protect payment card data and enhance transaction security.
This standard applies to any entity that stores, processes or transmits payment card data.
by Alexander | 4 November 2024
A pentest is an intrusion test carried out by a cybersecurity expert (known as a pentester or ethical hacker) who attempts to infiltrate an organisation's computer system to detect exploitable security flaws.
The aim is to assess the robustness of defences and correct vulnerabilities before they are exploited by real hackers.
by Alexander | 4 November 2024
A pentester is a cybersecurity expert whose job is to simulate computer attacks on information systems in order to identify vulnerabilities. They use their skills in a legal and authorised manner to test and improve the security of IT systems.
It's also known as ethical hacking.
by Alexander | 8 October 2024
A business continuity plan (BCP) is a strategic document that describes the measures to be implemented to maintain a company's essential activities in the event of a crisis or major incident (cyber attack, natural disaster, etc.).