top of page

Pentera Makes Public its Cyber Research Arm, Pentera Labs

Updated: Jun 15, 2022

The Research team’s publications explaining recent adversary techniques are shared with the cybersecurity defenders’ community

Pentera Team . Photo credit: Starloa
Pentera Team . Photo credit: Starloa

Pentera, an Israeli cybersecurity company that operates in the field of Automated Security Validation, unveiled its new research arm, Pentera Labs. The company has made its recent publications available to any cyber defender to help them identify, analyze and mitigate new adversary tactics and techniques in the wild.

The Pentera Labs team actively monitors threat intelligence feeds to identify new critical vulnerabilities and the latest attack techniques used by adversaries. These findings are synthesized and fed into the Pentera platform to continually enhance its security testing capabilities.

This enables subscribers of the Pentera platform to keep their security validation program abreast of the latest attack techniques and grow their cyber resilience.

Through its ongoing research, Pentera Labs recently discovered and disclosed two zero-day vulnerabilities in VMWare vCenter, potentially exposing more than 500,000 organizations globally.

As part of its public contribution, Pentera Labs recently submitted new attack techniques to the MITRE ATT&CK framework, becoming an official contributor to the globally-accessible knowledge base of adversary tactics and techniques.

“Every day, Pentera Labs’ research team steps into an adversary’s mindset to safely probe the security controls protecting top enterprises,” said Alex Spivakovsky, the company’s VP of Research who also leads the Labs’ work.

He added that their findings “are fueling the engine that powers our lab with research-based threat intelligence, providing our customers with the latest information on real-world vulnerabilities and attack techniques. By sharing research with the greater security community, we are proud to be helping security practitioners all around the globe efficiently detect and remediate threats and security gaps before they are exploited.”

10 views0 comments
bottom of page