Category: brackish

  • Blog
  • Category: brackish

Common IoT Device Vulnerabilities in 2023

We made a list of common IoT vulnerabilities we discovered during the year of 2023! Understanding common vulnerabilities in IoT devices is crucial for both consumers and manufacturers to ensure the safety and privacy of users. In this blog post, we’ll explore these vulnerabilities and discuss measures to mitigate them. Common Vulnerabilities in IoT Devices

The Importance of Comprehensive IoT Penetration Testing in Modern Cybersecurity

In the dynamic landscape of the Internet of Things (IoT), where everyday devices are interconnected and smarter than ever, the significance of cybersecurity can’t be overstated. Comprehensive IoT Penetration Testing emerges as a crucial strategy for businesses and individuals alike to fortify their digital frontiers. This blog post delves into the why and how of

Shodan Series Part 2: The Untraditional Web Ports

Our goal of this series is to revisit Shodan and demonstrate to IT admins and business owners, how much an attacker can glean of a network without sending any packets to the actual to an organization. Our last post focused on Remote Desktop Protocol being exposed to the publicly accessible internet: This week we

The Power of Password Complexity

In the constantly evolving landscape of cybersecurity, two factors consistently play pivotal roles in safeguarding digital assets: password complexity and regular penetration testing. At Brackish Security, we’ve seen firsthand how these elements work in tandem to fortify defenses against cyber threats. The Importance of Password Complexity In an age where data breaches are increasingly common,

Not All Penetration Tests Are Created Equally

In the dynamic world of cybersecurity, penetration testing (pen testing) has become a cornerstone for businesses seeking to fortify their defenses against cyber threats. However, it’s crucial to understand that not all pen tests are created equally. At Brackish Security, we believe in enlightening our clients about these differences, ensuring they can make informed decisions

Shodan Series Part 1: The Accidental Open Door

We wanted to create this blog series to highlight how important regular penetration testing is and how it effectively reduces risk. This week we will focus on port 3389, traditionally used for Windows Remote Desktop Protocol (RDP), which allows users to access their desktop over a network connection. It’s like leaving the keys in the

Penetration Testing for Small Businesses: Why It’s Crucial and How to Get Started

In today’s digital age, where online transactions and interactions form the backbone of most businesses, cybersecurity has emerged as a paramount concern. For small businesses, especially, navigating the vast and often murky waters of cybersecurity can seem daunting. Yet, the need for such endeavors has never been more pressing. A concerning statistic reveals that a

More MobSF – Mobile Application Penetration Testing #3

Mobile Application Penetration Testing