<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber security vulnerability Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/cyber-security-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/cyber-security-vulnerability/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 23 Sep 2024 13:35:02 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>cyber security vulnerability Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/cyber-security-vulnerability/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Unveiling the Efficacy of Penetration Testing in Cybersecurity</title>
		<link>https://www.vertexcybersecurity.com.au/unveiling-the-efficacy-of-penetration-testing-in-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=unveiling-the-efficacy-of-penetration-testing-in-cybersecurity</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 02:01:13 +0000</pubDate>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[penetration test]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7433</guid>

					<description><![CDATA[In today&#8217;s digital landscape, where cyber threats loom large, safeguarding sensitive data and networks is paramount. One of the key methodologies employed to fortify these defenses is penetration testing, often referred to as pen-testing. This proactive approach involves simulated attacks on a system to identify vulnerabilities before malicious actors exploit them. The Significance of Penetration [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Nissan Oceania Cyber Incident: A Closer Look</title>
		<link>https://www.vertexcybersecurity.com.au/nissan-oceania-cyber-intrusion-a-closer-look-at-the-ongoing-investigation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nissan-oceania-cyber-intrusion-a-closer-look-at-the-ongoing-investigation</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Sat, 04 Nov 2023 02:47:21 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7418</guid>

					<description><![CDATA[In a digital era marked by technological advancements and interconnected systems, cyber security has become a critical concern for businesses across the globe. Nissan Oceania found itself at the centre of attention due to a significant &#8216;cyber incident&#8217;. This has sparked investigations and raised pertinent questions about the vulnerabilities in our digital infrastructure. Understanding the [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Unraveling the Essence of Good Cyber Security</title>
		<link>https://www.vertexcybersecurity.com.au/unraveling-the-essensce-of-good-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=unraveling-the-essensce-of-good-cyber-security</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Fri, 03 Nov 2023 05:05:55 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7368</guid>

					<description><![CDATA[In today&#8217;s interconnected world, where digital footprints mark our every move, the significance of robust cyber security cannot be overstated. From personal data to critical infrastructure, everything is vulnerable to cyber threats. Good cyber security serves as the bulwark against these omnipresent dangers. Significance of Good Cyber Security The essence of good cyber security lies [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Pen Testing Companies in Australia: Safeguarding Cybersecurity</title>
		<link>https://www.vertexcybersecurity.com.au/pen-testing-companies-in-australia-safeguarding-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=pen-testing-companies-in-australia-safeguarding-cybersecurity</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Sun, 29 Oct 2023 05:00:43 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7358</guid>

					<description><![CDATA[In today&#8217;s digital age, where every aspect of our lives intertwines with technology, ensuring robust cybersecurity measures is paramount. Penetration testing, or pen testing, stands as a cornerstone in fortifying the digital fortresses against potential threats. In Australia, the role of pen testing companies is pivotal in safeguarding sensitive information and systems from malicious actors. [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Post-exploitation in penetration testing</title>
		<link>https://www.vertexcybersecurity.com.au/post-exploitation-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=post-exploitation-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 00:31:54 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[penetration test]]></category>
		<category><![CDATA[post-exploitation]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5701</guid>

					<description><![CDATA[Post-exploitation is a crucial phase in penetration testing that follows the successful exploitation of a vulnerability in a target system. It involves a range of techniques and methodologies aimed at maintaining access to the compromised system and gathering sensitive information that can be used to launch further attacks. Post-exploitation can be challenging, as defenders often [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Should you disable the WAF for penetration testing?</title>
		<link>https://www.vertexcybersecurity.com.au/should-you-disable-the-waf-for-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=should-you-disable-the-waf-for-penetration-testing</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 12 Apr 2023 00:22:41 +0000</pubDate>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[disable the WAF]]></category>
		<category><![CDATA[penetration test]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5685</guid>

					<description><![CDATA[Penetration Testing, colloquially known as pen-testing, is a process where a system such as a website, network, API, server, computer, WiFi or infrastructure is tested for vulnerabilities using the same methods and tools a Cyber Attacker, or &#8220;Hacker&#8221;, would apply. Unlike a Cyber Attacker, a Penetration Tester is ethical so they share the vulnerabilities with [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>What is White-Box Penetration Testing?</title>
		<link>https://www.vertexcybersecurity.com.au/what-is-white-box-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-is-white-box-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Sun, 26 Mar 2023 23:41:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[White-Box Penetration Testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5610</guid>

					<description><![CDATA[White-box penetration testing is a type of security testing that involves a complete understanding of the system or network being tested. It is also known as transparent box testing, clear box testing, and structural testing. In this testing, the tester has complete knowledge about the internal workings of the system, such as source code, architecture, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>An Introduction to Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/an-introduction-to-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=an-introduction-to-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 20 Mar 2023 01:54:43 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[penetration test]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5529</guid>

					<description><![CDATA[Penetration testing, or pen-testing for short, is a simulated cyber-attack that aims to identify and exploit vulnerabilities in a system or network to evaluate the security of the system. Penetration testing is a critical security measure that organizations use to assess the effectiveness of their security defenses against external attacks. This article provides an overview [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Australians Losing Millions from Cyber Scams</title>
		<link>https://www.vertexcybersecurity.com.au/australians-losing-millions-from-cyber-scams/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=australians-losing-millions-from-cyber-scams</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Tue, 15 Nov 2022 16:24:38 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[cyber security monitoring]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4744</guid>

					<description><![CDATA[Australian individuals and businesses are losing big to cyber attacks and scams, with a reported $295 million lost in scams in the first half of 2022 alone. The total loss has more than doubled the total for the same time period in 2021. While investment scams and dating and romance scams topped the list for [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Increasing Number of Security Breaches</title>
		<link>https://www.vertexcybersecurity.com.au/increasing-number-of-security-breaches/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=increasing-number-of-security-breaches</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Tue, 15 Nov 2022 16:14:14 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4730</guid>

					<description><![CDATA[A recent report has revealed a 297% increase in breaches caused by third-party suppliers, accounting for 25% of all reported breaches. This steep increase in third-party vendor-related breaches is unprecedented, and comes following some widely publicised third-party breaches, like in the case of the SolarWinds and Kaseya cyber attacks. This increase brings attention to the [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
