River Security

Cato Stensland is the new OSOC Lead at River Security.

We are proud to announce that Cato Stensland has been promoted to the role of Offensive Security Operation Center (OSOC) Lead at River Security, effective January 1, 2025. Over the past 1.5...
Read More about Cato Stensland is the new OSOC Lead at River Security.

A special invite to the Annual conference in Bergen

River Security on Stage with Norway’s Leaders – A Defining Moment When a growing company like River Security is invited to share the stage with the Prime Minister, top leaders...
Read More about A special invite to the Annual conference in Bergen

Why Cyber Due Diligence is Critical for M&A Success

[Editors Note: Even Andreassen is one of our talented business developers. He is also an assistant professor at a Norwegian university. In this excellent blog post he has given us...
Read More about Why Cyber Due Diligence is Critical for M&A Success

Pentesting is Transforming: 8 Steps to a Successful Pentest Operation in 2025!

Pentesting isn’t what it used to be, folks. Gone are the days of single checklist exercises and surface-level scans. In 2025, we’re transforming the way we think about pentesting—making it...
Read More about Pentesting is Transforming: 8 Steps to a Successful Pentest Operation in 2025!

The Art of Discovery: A Penetration Tester’s Journey Through a Django Misconfiguration

[Editors Note: Eirik Valle Kjellby is an amazing gentleman and the latest, as of October 2024, addition to the ever growing penetration testing team at River Security. He continues to...
Read More about The Art of Discovery: A Penetration Tester’s Journey Through a Django Misconfiguration

Compliance and Confusion – Your Guide to Navigate the Most Common Frameworks and Regulations for Cyber Security 

In this comprehensive guide I will go through the most common frameworks and regulations for Cyber Security, as there might be some confusion in how to apply them to the...
Read More about Compliance and Confusion – Your Guide to Navigate the Most Common Frameworks and Regulations for Cyber Security 

Back to Austevoll – Hacker Space

A couple of weeks ago, we packed our things at River Security and headed back to the beautiful Austevoll to participate in our semi-annual Hackathon, which we’ve named "Hacker Space."...
Read More about Back to Austevoll – Hacker Space

Welcome to the River Security team, Bjørnar!

We are excited to announce that Bjørnar has joined us as a Fullstack Developer, bringing a wealth of experience in programming, devops, and web development. At 27 years old and...
Read More about Welcome to the River Security team, Bjørnar!

Penetration Testing Methodology – Much More Than Just Checklists

This blog post seeks to outline key aspects of the methodology River Security employs to identify vulnerabilities during our penetration testing. Our approach is continually evolving, designed to adapt to...
Read More about Penetration Testing Methodology – Much More Than Just Checklists

Depiction from B-Sides & DEF CON 32 

This year’s B-Sides and DEF CON 32 were my first time ever going to the States and a hacking convention as large as DEF CON. Located in the Las Vegas...
Read More about Depiction from B-Sides & DEF CON 32