PwnTillDawn Online Battlefield New Features Announcement

PwnTillDawn Online Battlefield – New Features and Improvements

Our CTF style Penetration Testing lab, PwnTillDawn Online Battlefield just got some awesome new features and improvements we are sure you will...
Phishing Illustration

Social Engineering & Email Phishing – The 21st Century’s #1 Attack?

Together with your internet-facing web apps, you are undeniably the #1 target of a cyber attacker to either break...
Digital Transformation illustration

Digital Transformation

The example of digital transformation studied by Digitalya, and available on their blog (see link below) is...
PwnTillDawn Mexico Competition - Logo

PwnTillDawn Mexico 2019

On the 6th of April 2019, wizlynx group hosted its first computer hacking competition, PwnTillDawn in Mexico City. Part capture the flag...
crest Logo

WLX is now CREST accredited Penetration Testing Provider GLOBALLY!

Based on the great success of wizlynx group in the Asia Pacific region providing CREST accredited penetration testing services, we decided to extend our...
RSA 2018 Event

RSA Asia Conference 2018

wizlynx group will be exhibiting at the RSA Asia Conference that will take place at the Marina Bay Sands in Singapore from the 25th to...
CIAG 2018 Event Banner

ISACA 2018 Cybersecurity, IT Assurance & Governance Conference

wizlynx group will be exhibiting at the ISACA 2018 Cybersecurity, IT Assurance & Governance Conference that will take place at the Sheraton Hotel Petaling...
AI Illustration

The Rise of Artificial Intelligence in Cyber Security

Currently, the new trends in cyber security are the use of artificial intelligence (AI) and machine-learning to predict threats before they are even conceived....
web app threats and vulnerabilities illustration

Web Apps: A Great Target For Cyber Criminals

Web Applications are everywhere, and are in most cases a core component for companies. They are used for various reasons and very often capture,...
Hacker illustration

Effectively Securing Your Corporate Web Applications in 5 Steps

According to the latest Verizon Data Breach Investigations Report, cyber-attacks are on the rise. The cat-and-mouse game between hackers and defenders of corporate web...
- Advertisement -
Ethical Hacking and Penetration Testing

Recent Posts