top of page

Nemesis Now Speaks MCP – Ushering In the Age of AI-Driven Security Validation
We're thrilled to share that Nemesis , our breach-and-attack simulation (BAS) platform, is now fully integrated with the Model Context...
Apr 72 min read

Using YARA For Adversary Simulation
In today’s evolving threat landscape, ensuring that your security controls are both robust and responsive is paramount. At Persistent...
Mar 214 min read

Automated Penetration Testing vs. Breach & Attack Simulation: A Side-by-Side Comparison
In cybersecurity, understanding your weaknesses before attackers do is crucial. Organizations rely on various tools to assess and...
Feb 262 min read

Which Cyber Defenses Actually Work in 2025
Many companies mistakenly interpret the absence of cybersecurity incidents as evidence that their defenses are robust. However, this...
Feb 264 min read

Think You’re Ready for DORA? Think Again!
As the January 17, 2025 deadline for the Digital Operational Resilience Act (DORA) has passed, financial institutions across the EU are...
Jan 224 min read

Navigating DORA Compliance for Insurance Firms: An Introduction
The Digital Operational Resilience Act (DORA) represents a turning point in Europe’s approach to digital operational security, and its...
Nov 6, 20243 min read

Digital Operational Resilience Act Series: Article 26 and 27 - Pen testing and Red Teaming
The final tranche of Regulatory Technical Standards (RTS) for the Digital Operational Resilience Act (DORA) have been published last...
Aug 2, 20242 min read

Digital Operational Resilience Act Series: Regulator Reactions and Information so far.
With the final set of Regulatory Technical Standards (RTS’s) being released on July 17th, 2024, there has not been an overly prescriptive...
Jul 10, 20242 min read

Digital Operational Resilience Act Series: Article 25 - I have to test, what now?
Article 25 - Testing of ICT tools and systems One of the five pillars of the Digital Operational Resilience Act (DORA), is the Digital...
Jul 2, 20242 min read

Validate CVE-2024-30078: Windows WiFi Remote Code Execution
On June 11th, Microsoft released hotfixes for CVE-2024-30078 labeled as "Windows Wi-Fi Driver Remote Code Execution Vulnerability". This...
Jun 21, 20245 min read

When "Phish-Proof" Gets Hooked
In the digital age, the escalation of phishing attacks has pushed the envelope on the development of more robust security measures....
May 6, 20244 min read

Beacon-on-Demand: Abusing push notifications for persistence
Abusing push notifications on Windows to gain persistence and launch beacons on demand.
Jun 9, 20233 min read

Introducing SMShell: Staying covert using SMS based implant
During OffensiveCon 2023, Markus Vervier, founder/director of PSI, presented his research on security aspects of embedded SIM cards...
May 22, 20233 min read

AiTM vs Two-Factor Authentication (2FA) mechanisms
In this blog post, we will delve into the impact of this novel phishing approach on most two-factor authentication (2FA) mechanisms and high
Mar 29, 20234 min read
AiTM (Adversary-in-the-Middle) Phishing
As more and more people rely on digital communication for their everyday lives, the threat of cyber-attacks becomes increasingly significant
Mar 17, 20237 min read
Blog
News & Resources
Subscribe to keep updated about the latest product features, technology news and resources.
Want to learn more about how Nemesis can help you?
Fill in the form and we will contact you shortly or you can always reach us out via: info@persistent-security.net
Contact us
Demo session
Join our upcoming live demo session, held every Friday from 10:00 to 11:00 AM (CET). You will receive an email with the access link upon registration. If you prefer a personalised demonstration, please sign up for a custom demo here.
Fill in the form with any question you have, so we can get in contact.
bottom of page