We are excited to introduce our new video series, How Do Hackers Do Things! How Do Hackers Do Things will focus on different methods of hacking that cybercriminals use to exploit their victims. Our goal is bring awareness to the vulnerabilities and hacking methods that surround our everyday lives.
In our first episode, GraVoc Security Consultant, Josh Jenkins, will show you how hackers can take advantage of Shodan. Shodan is a freely available tool on the Internet that allows anyone to perform advanced recon on a target URL. This type of activity can potentially allow a malicious actor to gain a foothold and further compromise your website or network.
In order to prevent attacks like these from happening, it is important to fully understand your external vulnerability attack surface. This would typically get done through an External Vulnerability Assessment and Penetration Testing. Click to learn more about External Vulnerability Assessments and Penetration Testing.
How Do Hackers Do Things Series
If you enjoyed this video, make sure to check out our other How Do Hackers Do things videos for more great security videos and tips! How Do Hackers Do Things focuses on different methods of hacking that cybercriminals use to exploit their victims. Our goal is bring awareness to the vulnerabilities and hacking methods that surround our everyday lives!
Related articles
Change Healthcare Attack: Ransomware Protection Measures for Healthcare Organizations
In light of the Change Healthcare attack, we explore why hackers target healthcare and how healthcare can defend against ransomware.
GraVoc Recognized on CRN MSP 500 List for Second Year in a Row
For the second year in a row, GraVoc has been recognized on the CRN® MSP 500 list in the Pioneer 250 category!
PCI SAQ Types: Which SAQ is Right for Your Business?
In this blog post, we provide an overview of the SAQ types for PCI DSS v4.0 and how to select a PCI SAQ that’s right for your business.