Skip to the content
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

NEWS

Loading...

April • 17 • 2023

Reporting in Penetration Testing

Penetration testing is a crucial aspect of ensuring the security...
READ MORE

April • 14 • 2023

Post-exploitation in penetration testing

Post-exploitation is a crucial phase in penetration testing that follows...
READ MORE

April • 13 • 2023

Exploitation in Penetration Testing

Penetration testing, commonly referred to as pen testing, is a...
READ MORE

April • 12 • 2023

Vulnerability Analysis In Penetration Testing

Vulnerability analysis is an integral part of the penetration testing...
READ MORE

April • 12 • 2023

Should you disable the WAF for penetration testing?

Penetration Testing, colloquially known as pen-testing, is a process where...
READ MORE

April • 6 • 2023

Enumeration In Penetration Testing? What is it?

Enumeration is the process of gathering information about a target...
READ MORE

April • 4 • 2023

Service NSW sensitive data Leaks

Service NSW has issued an email to 3700 users who...
READ MORE

April • 4 • 2023

Help! I’m Under Personal Cyber Attack!

Have you ever experienced a personal cyber attack? There have...
READ MORE

April • 3 • 2023

Latitude Data Breach – What Should You Do?

In March 2023, hackers managed to steal the data of...
READ MORE

April • 3 • 2023

Scanning In Penetration Testing – An Introduction

Scanning is an essential step in the penetration testing process...
READ MORE
1 2 … 59 Next »

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
  • 1300 229 237
  • Suite 10 30 Atchison Street St Leonards NSW 2065
  • 477 Pitt Street Sydney NSW 2000
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2026 Vertex Technologies Pty Ltd (ABN: 67 611 787 029). Vertex is a private company (beneficially owned by the Boyd Family Trust).

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Cammeraygal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.