Automated security validation firm Penteannounced last week the launch of its new Pentera Labs research branch to actively monitor threat intelligence feeds, identify new critical vulnerabilities and the latest adversary attack strategies.
Pentera Labs is the research powerhouse behind Pentera’s automated security validation platform.
The company has also made its recent publications regarding new cyberattack tactics available to any cybersecurity company looking to improve its identification and analysis capabilities. Pentera’s findings are made accessible through its security platform where subscribers can learn and update their cybersecurity protocols accordingly.
Pentera Labs then submitted new attack techniques to the TAB AT&CT framework, and later became an official contributor to the globally accessible knowledge base of adversary tactics and techniques.
Founded in 2015, Pentera operates a network penetration testing platform designed to analyze and mitigate cybersecurity risks for businesses worldwide across multiple geographic markets. The automated platform is operated remotely both in the cloud and on company premises to detect, assess and enforce remediation efforts on vulnerabilities that may be breached. In fact, Pentera Labs recently identified and publicly disclosed two zero-day vulnerabilities in VMware vCentermost likely exposing over 500,000 organizations worldwide.
“Every day, the Pentera Labs research team enters an adversary’s mindset to securely probe the security controls protecting large enterprises,” said Alex Spivakovsky, vice president of research. at Pentera Labs. “Pentera Labs discoveries power the engine that powers the Pentera Platform with research-based threat intelligence, providing our customers with the latest insights into real-world vulnerabilities and attack techniques. By sharing Pentera Labs research with the broader security community, we pride ourselves on helping security practitioners around the world effectively detect and remediate security threats and vulnerabilities before they happen. be exploited.