• [email protected]

logo
  • Services

    • col

      • Resilient MDR

        Protect your business 24/7

      • Exposure

        Uncover your security weaknesses

    • col

      • Advisory

        Plan your business resilience

      • Training

        Foster your company security

  • Resources

    • Blog

      Learn from our experts

    • Glossary

      Technical terms

  • Company

    • col

      • Who we are

        Commitment, enthusiasm and dedication to everything we do.

      • Our Partners

        Accelerate your success with our technology partners.

      • Careers

        Discover what it means to be a part of Ackcent

  • Contact Us

  • Get an Assessment

logo
  • Services

    • col

      • Resilient MDR

        Protect your business 24/7

      • Exposure

        Uncover your security weaknesses

    • col

      • Advisory

        Plan your business resilience

      • Training

        Foster your company security

  • Resources

    • Blog

      Learn from our experts

    • Glossary

      Technical terms

  • Company

    • col

      • Who we are

        Commitment, enthusiasm and dedication to everything we do.

      • Our Partners

        Accelerate your success with our technology partners.

      • Careers

        Discover what it means to be a part of Ackcent

  • Contact Us

  • Get an Assessment

  • [email protected]

Explore our content categories

All Ackcent News Awareness Cyber basics Endpoint security Incidense response team Industry insights MDR Team Red Team Vulnerabilities
Two Critical Vulnerabilities Discovered in JetBrains TeamCity

Incidense response team

Red Team

Vulnerabilities

Two Critical Vulnerabilities Discovered in JetBrains TeamCity

Rapid7 researchers have discovered two critical vulnerabilities in JetBrains TeamCity – a popular build management and continuous integration/delivery (CI/CD) server. Given the

Penetration testing vs vulnerability scanning: what’s the difference?

Cyber basics

Red Team

Penetration testing vs vulnerability scanning: what’s the difference?

Often confused as the same thing, penetration testing and vulnerability scanning both bring dedicated attack services to help protect an organization’s system, network, and

The rise of Emotet

Awareness

Incidense response team

Red Team

The rise of Emotet

Emotet is a multipurpose malware which is mainly distributed through spam mails. It was first spotted in 2014 and was designed to steal bank account

Initial Access – Drive-by Compromise (T1189)

Incidense response team

Red Team

Initial Access – Drive-by Compromise (T1189)

This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical

  • Company

    • About Us

    • Partners

    • Careers

  • Resources

    • Blog

    • Glossary

  • Get in touch

    • Contact Us

© Ackcent 2025. All rights reserved.

  • Cookie Policy

  • Terms of Use

  • Whistleblowing