Modern cyber-criminal gangs, deploy multiple state-of-the-art techniques to retrieve information from a compromised or breached company. This is because most companies isolate, in varying degrees, their internal network from the public internet, blocking certain file transfer protocols, or prevent access…

Author Info
- Name:Bruno Pincho | Penetration Tester
- Email:[email protected]
- Total Post: 1
Msc in Electrical and computer engineering, worked initially in internet and web programming, until I specialised in penetration testing.
CEH and PNPT certificated.
CEH and PNPT certificated.