The Blog
Find our latest news here!
Improve your TLS encryption
Although HTTPS is easy to set up, default or aging configurations are often vulnerable and do not guarantee the best level of security for the user. In addition, a bad configuration also leads to a reduction in the ratings assigned by cybersecurity products on which cyber insurance can be based.
Internal pentest : Why ? Which scenario?
Today the majority of attacks pass through emails. 📨
Antispam solutions exist but when the hacker is already in your company, it is difficult to know the actual impact without having, beforehand, an internal security audit!
Pentest stories : internal
Pentest stories This series of articles makes you follow Jean, an imaginary pentester, in his missions of intrusion tests. Clients and exploit stories are just as imaginary, but correspond to reality and are based on the experiences of DSecBypass experts. It aims to...
Pentest stories: the website
Pentest stories This series of articles makes you follow Jean, an imaginary pentester, in his missions of intrusion tests. Clients and exploit stories are just as imaginary, but correspond to reality and are based on the experiences of DSecBypass experts. It aims to...
Pentest stories : external
Pentest stories This series of articles makes you follow Jean, an imaginary pentester, in his missions of intrusion tests. Clients and exploit stories are just as imaginary, but correspond to reality and are based on the experiences of DSecBypass experts. It aims to...