Community
Content
All
- All
- Attack Surface Management
- News
- Penetration Testing
- River Security
Back to Austevoll – Hacker Space
A couple of weeks ago, we packed our things at River Security and headed back to the beautiful Austevoll to participate in our semi-annual Hackathon, which we’ve named "Hacker Space."...
Welcome to the River Security team, Bjørnar!
We are excited to announce that Bjørnar has joined us as a Fullstack Developer, bringing a wealth of experience in programming, devops, and web development. At 27 years old and...
Penetration Testing Methodology – Much More Than Just Checklists
This blog post seeks to outline key aspects of the methodology River Security employs to identify vulnerabilities during our penetration testing. Our approach is continually evolving, designed to adapt to...
Depiction from B-Sides & DEF CON 32
This year’s B-Sides and DEF CON 32 were my first time ever going to the States and a hacking convention as large as DEF CON. Located in the Las Vegas...
Strategic Expansion: Knut Martin Hauge Joins River Security’s Board of Directors
We are proud to announce a key addition to our Board of Directors as we continue our journey of scaling and international expansion. Knut Martin Hauge joins us, bringing a...
Welcome to River Security, Eirik!
We are very happy to announce the newest addition to our River Security team, Eirik, who will hold the position of Offensive Security Engineer! With a strong passion for cybersecurity...
My First Weeks as COO at River Security
When I received the job offer to become the COO at River Security, I was thrilled, humbled, and super excited. I was joining a company with unparalleled expertise in cyber...
Introducing new COO, Chris Dale Steps into Chief Hacking Officer
We are happy to introduce Christian Engen as the new Chief Operating Officer (COO) at River Security. Christian steps into this pivotal role, succeeding one of our founders, Chris Dale....
Finding Attack Surface and Other Interesting Domains via Certificate Transparency Logs
Certificate Transparency (CT) logs are like public records for internet security. When a new TLS certificate is issued, it gets logged in these CT logs. This makes it easier for...
Celebrating 4 Years of River Security: A Journey of Growth, Success and Stopping the Threat Actors!
As we celebrate our fourth anniversary, we at River Security are filled with immense pride and gratitude. What started as a small, ambitious venture has now grown into a robust...