Pākiki Blog

The latest insights, vulnerabilities, research, and release information from the Pākiki team.

Follow us on social media:
Categories: Security  Proxy  Walkthroughs 
featured image Getting into Cybersecurity

Getting into Cybersecurity


Categories: Security Tags: Careers Advice
We’re regularly getting people reaching out and asking for either jobs or career advice. So what does it take to get into cybersecurity, and penetration testing in particular? Caveats: These are the views of Pākiki, other pentesting companies may have different policies or things they value. If you … ...Read Article

featured image 3 Tips to Improve your Security Posture

3 Tips to Improve your Security Posture


Categories: Security Tags: Explanation
It was our honour to present at TechFest, run by Canterbury Tech, on the 24th of May 2024. This talk was designed as an introduction to improving your business’s cybersecurity posture. It’s aimed at small to medium businesses who are either unsure of where to start, or are rolling out new systems. … ...Read Article

featured image What Is an Intercepting Proxy?

What Is an Intercepting Proxy?


Categories: Proxy Security Tags: Explanation
That’s a great question. An intercepting proxy is commonly used by security professionals in order to understand how an application communicates with a server, and to attempt to find security vulnerabilities by manipulating that traffic. An intercepting proxy is a tool we frequently use in … ...Read Article