<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>penetration testing Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/penetration-testing/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/penetration-testing/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 23 Mar 2026 05:15:14 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>penetration testing Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/penetration-testing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Is Your Robot Vacuum Watching You? The Security Lesson Behind the 7,000 Vacuum Breach</title>
		<link>https://www.vertexcybersecurity.com.au/is-your-robot-vacuum-watching-you-the-security-lesson-behind-the-7000-vacuum-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-your-robot-vacuum-watching-you-the-security-lesson-behind-the-7000-vacuum-breach</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 22:03:09 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[iot]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[smart home]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10339</guid>

					<description><![CDATA[A recent incident exposed 7,000 robot vacuums to a single user. Learn about the risks of IoT devices and how to enhance your home and business cybersecurity.]]></description>
		
		
		
			</item>
		<item>
		<title>The Shoe Theory: How Footwear Reveals Your Cyber Security Expert’s True Colours</title>
		<link>https://www.vertexcybersecurity.com.au/the-shoe-theory-how-footwear-reveals-your-cyber-security-experts-true-colours/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-shoe-theory-how-footwear-reveals-your-cyber-security-experts-true-colours</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 13:09:14 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[business security]]></category>
		<category><![CDATA[Corporate Culture]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Expert Advice]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[InfoSec]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10232</guid>

					<description><![CDATA[Discover why a cyber security expert's footwear might be the best indicator of their competence. Learn why comfortable shoes signal readiness and practical experience over salesmanship.]]></description>
		
		
		
			</item>
		<item>
		<title>Does Lovable Need Cyber Security?</title>
		<link>https://www.vertexcybersecurity.com.au/does-lovable-need-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=does-lovable-need-cyber-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 13:04:09 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI code security]]></category>
		<category><![CDATA[Linkable breach]]></category>
		<category><![CDATA[Lovable]]></category>
		<category><![CDATA[no-code vulnerability]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[RLS]]></category>
		<category><![CDATA[Supabase security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10230</guid>

					<description><![CDATA[Are Lovable apps secure? We reveal how 170+ Lovable apps were hacked due to RLS flaws and why no "AI for security" exists. Secure your no-code business with Vertex.]]></description>
		
		
		
			</item>
		<item>
		<title>The End of an Era: Why Microsoft&#8217;s Move Against RC4 is Great News for Your Security</title>
		<link>https://www.vertexcybersecurity.com.au/the-end-of-an-era-why-microsofts-move-against-rc4-is-great-news-for-your-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-end-of-an-era-why-microsofts-move-against-rc4-is-great-news-for-your-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 16 Dec 2025 05:45:30 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[AES]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Kerberoasting]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[RC4]]></category>
		<category><![CDATA[Service Accounts]]></category>
		<category><![CDATA[Windows Server]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10043</guid>

					<description><![CDATA[Microsoft is planning to disable the weak RC4 cipher for Kerberos authentication to combat Kerberoasting attacks. Learn what this means for your Active Directory security and the steps you must take now to transition to AES encryption.]]></description>
		
		
		
			</item>
		<item>
		<title>Startups and Cyber Security: When Is the Right Time to Start?</title>
		<link>https://www.vertexcybersecurity.com.au/startups-and-cyber-security-when-is-the-right-time-to-start/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=startups-and-cyber-security-when-is-the-right-time-to-start</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 02:18:33 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Startup]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[FinTech Security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SOC 2]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9979</guid>

					<description><![CDATA[Startups often delay cyber security to save cash, but risks rise with funding and marketing. Discover the essential cyber foundations you need before it's too late.]]></description>
		
		
		
			</item>
		<item>
		<title>From “Sick Care” to True Health: A Lesson for Your Business Cyber Security</title>
		<link>https://www.vertexcybersecurity.com.au/from-sick-care-to-true-health-a-lesson-for-your-business-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=from-sick-care-to-true-health-a-lesson-for-your-business-cyber-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sun, 23 Nov 2025 22:05:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Business Resilience]]></category>
		<category><![CDATA[Cyber Health]]></category>
		<category><![CDATA[cyber security audit]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Proactive Security]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9912</guid>

					<description><![CDATA[Are you treating your business security like "sick care"? Discover why waiting for a breach is like waiting for an illness, and how a proactive cyber audit can improve your organisational health.]]></description>
		
		
		
			</item>
		<item>
		<title>AI is Fast, Cheap, and Full of &#8220;Slop&#8221;. Why Experts Are Now Essential Validators</title>
		<link>https://www.vertexcybersecurity.com.au/ai-is-fast-cheap-and-full-of-slop-why-experts-are-now-essential-validators/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-is-fast-cheap-and-full-of-slop-why-experts-are-now-essential-validators</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 10 Nov 2025 00:18:46 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI Slop]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[cybersecurity audit]]></category>
		<category><![CDATA[External Audit]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Quality Assurance]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9827</guid>

					<description><![CDATA[AI is fast and cheap, but sacrifices quality. Learn how AI, like calculators for accounting, will make external expert audits in cybersecurity and law non-negotiable.]]></description>
		
		
		
			</item>
		<item>
		<title>Why Your Startup Needs a Security Partner That Thinks Like a Tech Company</title>
		<link>https://www.vertexcybersecurity.com.au/why-your-startup-needs-a-security-partner-that-thinks-like-a-tech-company/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-your-startup-needs-a-security-partner-that-thinks-like-a-tech-company</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 02:44:45 +0000</pubDate>
				<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[SOC2]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Scaleup]]></category>
		<category><![CDATA[Startup]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Virtual CISO]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9650</guid>

					<description><![CDATA[Vertex Cyber Security isn't just a service provider; we're a tech company too. Discover why our unique understanding of the startup and scaleup journey makes us the ideal partner to secure your business.]]></description>
		
		
		
			</item>
		<item>
		<title>Not Hacked, Credential Stuffed</title>
		<link>https://www.vertexcybersecurity.com.au/not-hacked-credential-stuffed/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=not-hacked-credential-stuffed</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 07:26:59 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Credential Stuffing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Audits]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9420</guid>

					<description><![CDATA[A security partner’s view of the AustralianSuper incidentAt Vertex Cyber Security we track every large-scale breach because it shapes the advice we give clients. The recent AustralianSuper scare did not stem from a breach of the fund’s servers. Rather, crooks reused stolen passwords to enter about 600 member accounts and stole money from ten of [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing Law Firms: The Benefits</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-law-firms-the-benefits/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-law-firms-the-benefits</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 09 May 2025 05:34:37 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Australian Privacy Act]]></category>
		<category><![CDATA[client confidentiality]]></category>
		<category><![CDATA[Cyber Resilience]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[law firms]]></category>
		<category><![CDATA[legal IT]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9403</guid>

					<description><![CDATA[Why Law Firms Face Unique Cyber Risk Penetration Testing law firms is essential. Law practices hold sensitive briefs, contracts, and intellectual property. Attackers know this. Moreover, most firms still lean on legacy systems and staff who juggle many tasks. Therefore, one mis-sent email or unpatched server can trigger costly drama. What Is Penetration Testing? A [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
