<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Tools and Methods on BSG Blog — Cybersecurity Insights</title><link>https://bsg.tech/blog/categories/tools-and-methods/</link><description>Recent content in Tools and Methods on BSG Blog — Cybersecurity Insights</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 15 Apr 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://bsg.tech/blog/categories/tools-and-methods/index.xml" rel="self" type="application/rss+xml"/><item><title>Mobile App Security Testing: iOS and Android Pentest Guide</title><link>https://bsg.tech/blog/mobile-app-security-testing-ios-android/</link><pubDate>Mon, 23 Mar 2026 09:00:00 +0000</pubDate><guid>https://bsg.tech/blog/mobile-app-security-testing-ios-android/</guid><description>&lt;p&gt;Your mobile app runs on devices you don&amp;rsquo;t control, in environments you can&amp;rsquo;t predict. That binary sitting on a user&amp;rsquo;s phone — with its local storage, hardcoded configuration, and network calls — is an entirely different attack surface from your web application. It demands a different testing approach.&lt;/p&gt;</description></item><item><title>Penetration Testing Cost in 2026: $4K–$100K+ Guide</title><link>https://bsg.tech/blog/what-can-you-expect-to-pay-for-penetration-testing/</link><pubDate>Tue, 17 Mar 2026 09:00:00 +0000</pubDate><guid>https://bsg.tech/blog/what-can-you-expect-to-pay-for-penetration-testing/</guid><description>&lt;p&gt;If you&amp;rsquo;re searching for &amp;ldquo;how much does a penetration test cost,&amp;rdquo; you want numbers — not vague marketing. Here&amp;rsquo;s the direct answer: &lt;strong&gt;most penetration tests cost between $4,000 and $25,000&lt;/strong&gt;, with complex enterprise engagements reaching $100,000 or more. But that range is meaningless without understanding what drives the price.&lt;/p&gt;</description></item><item><title>AI Is Changing AppSec: Agentic Security Tools in 2026</title><link>https://bsg.tech/blog/ai-appsec-agentic-security-tools-2026/</link><pubDate>Wed, 04 Mar 2026 11:56:21 +0000</pubDate><guid>https://bsg.tech/blog/ai-appsec-agentic-security-tools-2026/</guid><description>&lt;p&gt;February 2026 was a month that made the application security world pay attention. Anthropic launched &lt;a href="https://www.anthropic.com/news/claude-code-security"&gt;Claude Code Security&lt;/a&gt; — a system that had already found over 500 zero-day vulnerabilities in production open-source codebases before it shipped. Days earlier, the open-source Raptor framework showed that a properly orchestrated LLM could autonomously run Semgrep scans, execute CodeQL queries, validate whether findings are exploitable, generate proof-of-concept exploits, and produce patches. All in a single workflow.&lt;/p&gt;</description></item><item><title>Cloud Penetration Testing: AWS, Azure &amp; GCP Security Assessment</title><link>https://bsg.tech/blog/cloud-penetration-testing-aws-azure-gcp/</link><pubDate>Thu, 19 Feb 2026 16:40:30 +0000</pubDate><guid>https://bsg.tech/blog/cloud-penetration-testing-aws-azure-gcp/</guid><description>&lt;p&gt;Migrating to the cloud does not eliminate security risk — it transforms it. AWS, Azure, and GCP handle infrastructure-level protections, but the responsibility for securing configurations, identities, data, and workloads still falls on your organisation.&lt;/p&gt;
&lt;p&gt;Cloud penetration testing is a controlled security assessment that simulates real-world attacks against your cloud environment. Unlike automated scanning, a cloud pentest uses manual techniques to chain together misconfigurations, overly permissive IAM policies, and exposed services into attack paths that actually compromise data.&lt;/p&gt;</description></item><item><title>MITRE D3FEND Framework: Complete Guide for Defensive Security</title><link>https://bsg.tech/blog/mitre-d3fend/</link><pubDate>Thu, 29 Jan 2026 17:00:00 +0000</pubDate><guid>https://bsg.tech/blog/mitre-d3fend/</guid><description>&lt;p&gt;MITRE D3FEND is a knowledge graph of cyber&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security&lt;/a&gt; countermeasures that gives defenders a structured way to select, organize, and communicate defensive techniques. While &lt;a href="https://attack.mitre.org/"&gt;MITRE ATT&amp;amp;CK&lt;/a&gt; catalogs how adversaries attack, D3FEND answers the follow-up question every blue team asks: what exactly should we do about it?&lt;/p&gt;</description></item><item><title>AI Agent Security: Malicious Skills Threatening Dev Environments</title><link>https://bsg.tech/blog/ai-agent-security-malicious-skills-threat/</link><pubDate>Sat, 24 Jan 2026 14:57:24 +0000</pubDate><guid>https://bsg.tech/blog/ai-agent-security-malicious-skills-threat/</guid><description>&lt;p&gt;AI coding assistants like Claude, GitHub Copilot, and Cursor have transformed how developers work. But with great power comes a new attack surface: &lt;strong&gt;executable skills&lt;/strong&gt; that can turn your trusted AI assistant into a threat actor.&lt;/p&gt;
&lt;p&gt;Recent security research has uncovered a concerning pattern. Skills—the plugins and extensions that give AI agents their capabilities—can harbor malicious code that executes with your permissions, accesses your credentials, and spreads across your infrastructure. This isn’t theoretical: researchers have demonstrated &lt;a href="https://blog.lukaszolejnik.com/supply-chain-risk-of-agentic-ai-infecting-infrastructures-via-skill-worms/"&gt;skill worms&lt;/a&gt; that propagate through SSH configurations, exfiltrate secrets via base64-encoded curl commands, and persist across sessions.&lt;/p&gt;</description></item><item><title>Black Box vs White Box vs Grey Box Pentest</title><link>https://bsg.tech/blog/black-box-vs-white-box-vs-grey-box-penetration-testing/</link><pubDate>Fri, 23 Jan 2026 15:36:12 +0000</pubDate><guid>https://bsg.tech/blog/black-box-vs-white-box-vs-grey-box-penetration-testing/</guid><description>&lt;p&gt;What’s the difference between black box, white box, and grey box &lt;a href="https://bsg.tech/blog/penetration-testing/"&gt;penetration testing&lt;/a&gt;? If you think it’s about &lt;em&gt;access levels&lt;/em&gt;, you’re wrong—and you’re not alone.&lt;/p&gt;
&lt;p&gt;Most cybersecurity professionals, vendors, and even some pentest firms get this fundamentally wrong. The confusion costs companies money, weakens &lt;a href="https://bsg.tech/blog/application-security/"&gt;security assessment&lt;/a&gt;s, and leads to compliance issues.&lt;/p&gt;</description></item><item><title>Small Business Cybersecurity: Essential Checklist</title><link>https://bsg.tech/blog/small-business-cyber-security-checklist/</link><pubDate>Fri, 16 Jan 2026 16:07:54 +0000</pubDate><guid>https://bsg.tech/blog/small-business-cyber-security-checklist/</guid><description>&lt;p&gt;These cyber security for small business recommendations focus on the conventional Small and Medium Enterprise organizations. This text does not cover startup specifics or the &lt;a href="https://bsg.tech/blog/application-security/"&gt;application security&lt;/a&gt; needs of software development companies. This is just a checklist of the most crucial cyber security measures every small business owner can and must implement.&lt;/p&gt;</description></item><item><title>API Security Testing: OWASP API Top 10 Walkthrough</title><link>https://bsg.tech/blog/api-security-testing/</link><pubDate>Wed, 14 Jan 2026 21:56:37 +0000</pubDate><guid>https://bsg.tech/blog/api-security-testing/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;APIs (Application Programming Interfaces) have become the backbone of modern software architecture. From mobile apps to microservices, organisations rely on APIs to connect systems, share data, and deliver functionality. But this connectivity comes with risk.&lt;/p&gt;
&lt;p&gt;In 2026, APIs represent one of the most common attack vectors in web applications. According to industry data, 57% of organisations experienced an API-related data breach in the past year, with 73% of those facing three or more separate incidents. Major breaches continue to be traced back to insecure API endpoints.&lt;/p&gt;</description></item><item><title>OWASP LLM Top 10 (2025): Vulnerabilities &amp; Mitigations</title><link>https://bsg.tech/blog/owasp-llm-top-10/</link><pubDate>Mon, 12 Jan 2026 18:20:19 +0000</pubDate><guid>https://bsg.tech/blog/owasp-llm-top-10/</guid><description>&lt;p&gt;Every organisation seems to be integrating large language models into their products and workflows. Chatbots, code assistants, document analysers, customer service agents—generative AI is everywhere. But security hasn’t kept pace with adoption.&lt;/p&gt;
&lt;p&gt;OWASP recognised this gap and released a dedicated Top 10 for LLM Applications. Unlike traditional web vulnerabilities that developers have been battling for decades, LLM risks are fundamentally different. These systems process natural language, generate unpredictable outputs, and often have access to sensitive data and powerful actions. The attack surface is unlike anything we’ve seen before.&lt;/p&gt;</description></item><item><title>OWASP Top 10 2025: What Changed and Why It Matters</title><link>https://bsg.tech/blog/owasp-top-10/</link><pubDate>Mon, 12 Jan 2026 01:23:41 +0000</pubDate><guid>https://bsg.tech/blog/owasp-top-10/</guid><description>&lt;p&gt;The OWASP Top 10 is the definitive benchmark for web application security. The 2025 release brings the most significant changes in years: two entirely new vulnerability categories and major ranking shifts that reflect how modern attacks have evolved.&lt;/p&gt;
&lt;p&gt;These changes aren’t academic—they shape security policies, &lt;a href="https://bsg.tech/blog/penetration-testing/"&gt;penetration testing requirements&lt;/a&gt;, and development practices across the industry. Understanding what changed helps security teams prioritise resources and protect what matters most.&lt;/p&gt;</description></item><item><title>EU Radio Equipment Directive 2025: RED &amp; EN 18031 Guide</title><link>https://bsg.tech/blog/eu-radio-equipment-cybersecurity-red-en-18031-compliance-2025/</link><pubDate>Sun, 23 Nov 2025 14:36:33 +0000</pubDate><guid>https://bsg.tech/blog/eu-radio-equipment-cybersecurity-red-en-18031-compliance-2025/</guid><description>&lt;p&gt;From 2025, the European Union is raising the bar for cybersecurity in every connected device that uses radio technologies. If your product communicates via Wi-Fi, Bluetooth, cellular, Zigbee, LoRa, or any other radio interface, its path to the EU market now runs through a new compliance regime: &lt;strong&gt;RED cybersecurity requirements&lt;/strong&gt;, the &lt;strong&gt;EN 18031 harmonised standards&lt;/strong&gt;, and the &lt;strong&gt;Delegated Regulation (EU) 2022/30&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Cybersecurity Professional Standards</title><link>https://bsg.tech/blog/cybersecurity-professional-standards/</link><pubDate>Tue, 29 Jul 2025 13:41:52 +0000</pubDate><guid>https://bsg.tech/blog/cybersecurity-professional-standards/</guid><description>&lt;p&gt;The latest &lt;strong&gt;&lt;a href="https://open.spotify.com/episode/6AAdwUbHx3EZBBuqoSEe0M"&gt;NCSC Cyber Series&lt;/a&gt;&lt;/strong&gt; podcast gathers three voices who know the battlefield from different angles:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Tracey Jones, Senior Analyst at the Bank of England; Gian Andrea Padovani, Senior Manager in the PRA’s Cyber-Resilience team; and Chris Ensor, Deputy Director for Cyber Growth at the NCSC&lt;/em&gt;. Their discussion turns a spotlight on an issue that rarely makes headlines yet shapes every breach report we read: professional standards.&lt;/p&gt;</description></item><item><title>TLPT: Threat Led Penetration Testing Explained</title><link>https://bsg.tech/blog/tlpt-threat-led-penetration-testing-explained/</link><pubDate>Fri, 20 Jun 2025 10:00:00 +0000</pubDate><guid>https://bsg.tech/blog/tlpt-threat-led-penetration-testing-explained/</guid><description>&lt;p&gt;&lt;strong&gt;Threat Led Penetration Testing (TLPT)&lt;/strong&gt;, also known as &lt;strong&gt;threat-led pentesting&lt;/strong&gt;, is the gold standard for realistic &lt;a href="https://bsg.tech/blog/cyber-security/"&gt;cybersecurity&lt;/a&gt; validation. TLPT combines the latest &lt;strong&gt;threat intelligence&lt;/strong&gt;, &lt;strong&gt;red teaming tactics&lt;/strong&gt;, and &lt;strong&gt;business risk analysis&lt;/strong&gt; to simulate attacks that your organization is most likely to face. Unlike generic pentesting, TLPT tests not just your systems for vulnerabilities, but also your ability to &lt;strong&gt;detect, respond to, and contain&lt;/strong&gt; those attacks in real time.&lt;/p&gt;</description></item><item><title>Cyber Incident Response Plan for Small Business [2025]</title><link>https://bsg.tech/blog/cyber-incident-response-tips-for-small-businesses/</link><pubDate>Sat, 03 May 2025 16:06:58 +0000</pubDate><guid>https://bsg.tech/blog/cyber-incident-response-tips-for-small-businesses/</guid><description>&lt;p&gt;In today’s volatile cyber landscape, even small businesses are not immune to disruptive cyberattacks. Ransomware, phishing, and data breaches increasingly target companies of all sizes, and the ability to respond effectively can mean the difference between recovery and ruin. Interestingly, a valuable resource developed for UK local governments offers practical lessons for the private sector: the Local Government Association’s “Cyber Incident Grab Bag.”&lt;/p&gt;</description></item><item><title>Unforgivable Software Vulnerabilities</title><link>https://bsg.tech/blog/unforgivable-software-vulnerabilities/</link><pubDate>Fri, 04 Apr 2025 16:27:14 +0000</pubDate><guid>https://bsg.tech/blog/unforgivable-software-vulnerabilities/</guid><description>&lt;p&gt;Every piece of software has bugs. Many have vulnerabilities. But not all software vulnerabilities are created equal.&lt;/p&gt;
&lt;p&gt;Some are complicated, buried deep in obscure logic, or made possible by bleeding-edge exploit techniques. Others—well, others are glaringly obvious. These are the ones that make security professionals shake their heads and ask: &lt;em&gt;How did this ever make it to production?&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Cyber Kill Chain &amp; MITRE ATT&amp;CK Defense Guide | BSG</title><link>https://bsg.tech/blog/cyber-defense-using-cyber-kill-chain-and-mitre-attck-explained/</link><pubDate>Thu, 06 Feb 2025 15:41:48 +0000</pubDate><guid>https://bsg.tech/blog/cyber-defense-using-cyber-kill-chain-and-mitre-attck-explained/</guid><description>&lt;p&gt;In today’s threat landscape, cyberattacks are more sophisticated and persistent than ever. Organizations need structured approaches to detect, analyze, and respond to threats effectively. Two critical frameworks that have shaped modern cyber&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security&lt;/a&gt; defense are the &lt;strong&gt;&lt;a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html"&gt;Cyber Kill Chain&lt;/a&gt;&lt;/strong&gt; and the &lt;strong&gt;&lt;a href="https://attack.mitre.org/"&gt;MITRE ATT&amp;amp;CK Framework&lt;/a&gt;&lt;/strong&gt;. Understanding these models can significantly improve threat detection, incident response, and overall cybersecurity resilience.&lt;/p&gt;</description></item><item><title>End-to-End Encrypted Messaging: Why It Matters in 2026</title><link>https://bsg.tech/blog/end-to-end-encrypted-messaging/</link><pubDate>Fri, 06 Dec 2024 21:10:51 +0000</pubDate><guid>https://bsg.tech/blog/end-to-end-encrypted-messaging/</guid><description>&lt;p&gt;As cyber threats evolve, secure communication is becoming a cornerstone of both personal privacy and organizational &lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security&lt;/a&gt;. In late 2024, the &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a"&gt;FBI and CISA explicitly urged Americans to use encrypted messaging apps&lt;/a&gt; after the Salt Typhoon campaign compromised major U.S. telecommunications providers, exposing real-time calls and text messages to Chinese intelligence. Their message was clear: &lt;strong&gt;if your communications aren’t encrypted, they’re vulnerable.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Enhancing Cybersecurity to Align with NIS2 Directive</title><link>https://bsg.tech/blog/strengthening-cybersecurity-practices-in-compliance-with-the-nis2-directive/</link><pubDate>Mon, 02 Dec 2024 16:11:58 +0000</pubDate><guid>https://bsg.tech/blog/strengthening-cybersecurity-practices-in-compliance-with-the-nis2-directive/</guid><description>&lt;p&gt;The European Union’s NIS2 Directive, reinforced by ENISA’s 2024 Implementation Guidance, sets a comprehensive standard for [&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;cybersecurity&lt;/a&gt;](&lt;a href="https://bsg.tech/cyber-security/"&gt;https://bsg.tech/cyber-security/&lt;/a&gt;) across critical and digital service providers. For business leaders, adopting these practices ensures regulatory compliance and builds organizational resilience.&lt;/p&gt;
&lt;h2 id="understanding-the-nis2-directive-and-enisas-guidance"&gt;Understanding the NIS2 Directive and ENISA’s Guidance&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/raising-awareness-campaigns/network-and-information-systems-directive-2-nis2"&gt;NIS2 Directive&lt;/a&gt; mandates robust cybersecurity measures for entities across sectors such as cloud computing and online platforms. &lt;a href="https://www.enisa.europa.eu/publications/implementation-guidance-on-nis-2-security-measures"&gt;ENISA’s guidance&lt;/a&gt; provides actionable steps to implement these measures effectively, emphasizing risk management, incident handling, and supply chain security.&lt;/p&gt;</description></item><item><title>Empowering Cybersecurity Governance: NCSC’s Board Toolkit</title><link>https://bsg.tech/blog/empowering-cybersecurity-governance-ncscs-board-toolkit/</link><pubDate>Sun, 01 Dec 2024 12:07:28 +0000</pubDate><guid>https://bsg.tech/blog/empowering-cybersecurity-governance-ncscs-board-toolkit/</guid><description>&lt;p&gt;Cybersecurity is no longer just a technical issue; it’s a critical business risk that directly impacts organizational stability, reputation, and financial health. As digital dependency increases, so does exposure to cyber threats, from data breaches to ransomware attacks and supply chain vulnerabilities. For board members, addressing cybersecurity is not optional—it’s essential.&lt;/p&gt;</description></item><item><title>Security Awareness Training: Does It Actually Work?</title><link>https://bsg.tech/blog/the-truth-about-phishing-training-why-its-not-as-effective-as-you-think/</link><pubDate>Mon, 25 Nov 2024 16:48:56 +0000</pubDate><guid>https://bsg.tech/blog/the-truth-about-phishing-training-why-its-not-as-effective-as-you-think/</guid><description>&lt;p&gt;Phishing attacks remain the top cybersecurity threat globally, accounting for 33% of data breaches in small and medium businesses according to Verizon’s 2025 Data Breach Investigation Report. Despite investing heavily in employee training programs, organizations often find themselves repeatedly compromised. This raises a critical question: How effective are these phishing training programs in preventing real-world attacks?&lt;/p&gt;</description></item><item><title>SAMMY: Free Tool to Implement OWASP SAMM Security</title><link>https://bsg.tech/blog/enhance-software-security-with-sammy-and-owasp-samm/</link><pubDate>Mon, 04 Nov 2024 16:48:46 +0000</pubDate><guid>https://bsg.tech/blog/enhance-software-security-with-sammy-and-owasp-samm/</guid><description>&lt;p&gt;In today’s rapidly evolving digital landscape, ensuring the &lt;a href="https://bsg.tech/blog/software-product-security-where-to-start/"&gt;security of software applications&lt;/a&gt; is paramount. The OWASP Software Assurance Maturity Model (SAMM) provides organizations with a structured framework to assess and enhance their software &lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security practices&lt;/a&gt;. To effectively implement SAMM, organizations can leverage SAMMY, a comprehensive management tool developed by Codific.&lt;/p&gt;</description></item><item><title>How to Show Return on Cyber Security Investment</title><link>https://bsg.tech/blog/security-return-on-investment/</link><pubDate>Thu, 28 Dec 2023 12:00:00 +0000</pubDate><guid>https://bsg.tech/blog/security-return-on-investment/</guid><description>&lt;p&gt;Demonstrating your return on cyber&lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security investment&lt;/a&gt; to investors, boards, and top managers is one of the hardest challenges a CISO faces. Yet ROSI (Return on Security Investment) has become a non-negotiable KPI — especially since the &lt;a href="https://www.sec.gov/rules-regulations/2023/07/s7-09-22"&gt;SEC’s 2023 cybersecurity disclosure rules&lt;/a&gt; now require public companies to report board oversight of cyber risk.&lt;/p&gt;</description></item></channel></rss>