Simulated Attack – Red Teaming

Red teaming is an exercise that simulates a threat actor actively maneuvering against an organization. It aims to test your people, processes, and technologies of your organization. It also provides alternative perspectives to the effectiveness of your blue team operations.


Read More

Web Application Penetration Testing

Web Application Penetration Testing is a specific type of penetration testing that focuses on identifying web-related vulnerabilities and assess their impact on the business. Web Application Penetration Testing is not only to discover the technical vulnerabilities on the systems but also help to identify the potential impact on the business if the vulnerabilities were exploited by a real attacker.


Read More

Mobile Application Penetration Testing

Mobile Application Penetration Testing is specialized in assessing vulnerabilities in mobile apps environment, particularly on iOS and Android applications. The testing also assesses the backend API services that support business functions. Mobile Application Penetration Testing includes assessing the vulnerabilities on client apps, the servers (APIs) and the traffic between the server and client.


Read More

Infrastructure Penetration Testing

Infrastructure Penetration Testing assesses the security controls of the network and system infrastructure. Different from application penetration testing, Infrastructure Penetration Testing usually targets the infrastructure systems such as internal servers, network devices and supporting systems within a corporate network. The purpose of the testing is to identify vulnerabilities within the infrastructure and examine the possibility of further exploitation in order to determine the potential…


Read More

Phishing Simulations Assessment

Phishing Assessment uses deceptive emails, websites and other forms of cyberattacks to illegally gather personal information of its victims. Phishing Assessment applies phishing to gauge your staff response to real-life phishing email attacks. The purpose of the assessment is to understand the behavior of your staff and to raise their awareness regarding these attacks.


Read More

Vulnerability Assessment

Vulnerability Assessment is a process to identify known vulnerabilities and insecure configurations amongst systems. This process serves as a health check of the internal systems and networks and identifies non-compliance against the patch management and secure configuration of the client. Upon completion of the assessment, MXC will propose the remediation method followed by a verification testing to check if vulnerabilities are resolved.


Read More