{"id":13990,"date":"2026-02-25T16:53:11","date_gmt":"2026-02-25T14:53:11","guid":{"rendered":"https:\/\/www.inprosec.com\/?page_id=13990"},"modified":"2026-02-25T17:34:56","modified_gmt":"2026-02-25T15:34:56","slug":"offensive-security","status":"publish","type":"page","link":"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/","title":{"rendered":"Offensive Security"},"content":{"rendered":"<section class=\"l-section wpb_row cabecera-interior height_medium color_primary with_img parallax_ver parallax_xpos_right\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1018\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-abstracto-azul.jpg);background-position: bottom right;\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><nav class=\"g-breadcrumbs us_custom_f4397b66 separator_custom align_left\" itemscope itemtype=\"http:\/\/schema.org\/BreadcrumbList\"><div class=\"g-breadcrumbs-item\">Pages<\/div><\/nav><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h1 style=\"text-align: left;\">Offensive Security<\/h1>\n<h2 class=\"p1\">Information Security Services<\/h2>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_f1f1dff3 menu-servicios has_text_color hide_on_mobiles height_auto type_sticky\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><nav class=\"w-menu us_custom_ea2be81a layout_hor style_links us_menu_1\" style=\"--main-gap:2.5rem;--main-ver-indent:0.8em;--main-hor-indent:0.8em;--main-color:inherit;\"><ul id=\"menu-offensive-security\" class=\"menu\"><li id=\"menu-item-14224\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14224\"><a href=\"#vulnerability-assessment\">Vulnerability Assessment<\/a><\/li><li id=\"menu-item-14225\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14225\"><a href=\"#penetration-testing\">Penetration Testing<\/a><\/li><li id=\"menu-item-14226\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14226\"><a href=\"#red-team\">Red Team Exercises<\/a><\/li><\/ul><style>@media ( max-width:600px ){.us_menu_1 .menu{display:block!important}.us_menu_1 .menu>li{margin:0 0 var(--main-gap,2.5rem)!important}}<\/style><\/nav><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_b03640aa height_auto\"><div class=\"l-section-overlay\" style=\"background:rgba(40,139,208,0.10)\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container  has_bg_color stretched\"><div class=\"vc_column-inner us_custom_2bb309bb us_animate_this\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_23786b5e us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_large\"><\/div><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">We strengthen defences by validating security from within<\/span><\/span><\/h2><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We assess security from an attacker\u2019s perspective to<strong> identify genuine vulnerabilities.<\/strong> This approach helps predict potential attacks and reinforce your organisation\u2019s defensive capabilities.<\/p>\n<\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"vulnerability-assessment\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Vulnerability Assessment<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p><strong>We identify vulnerabilities across systems and applications<\/strong>, prioritising findings based on actual business impact and risk.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"e1aa\"><button class=\"w-tabs-section-header\" aria-controls=\"content-e1aa\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-e1aa\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We identify security flaws in infrastructure, applications, and systems before they can be exploited. We detect <strong>insecure configurations, outdated software, unnecessary or unprotected exposures<\/strong>, as well as known and emerging vulnerabilities that increase the attack surface and the risk of intrusion.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"l43a\"><button class=\"w-tabs-section-header\" aria-controls=\"content-l43a\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-l43a\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We perform advanced scans and manual analyses on internal and external infrastructures, cloud infrastructures, and applications and services, combining specialised tools with specialised technical reviews. We<strong> classify risks according to criticality<\/strong>, probability of exploitation, and impact on the business.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"i6e7\"><button class=\"w-tabs-section-header\" aria-controls=\"content-i6e7\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-i6e7\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i><strong>Complete visibility<\/strong> of actual security weaknesses in infrastructure and applications.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Risk prioritisation<\/strong> based on impact and likelihood of exploitation.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Proactive <strong>reduction<\/strong> of the <strong>attack surface.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Prevention of security<\/strong> incidents before they occur.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/9-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/9-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/9-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/9-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/9.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_d6434207 height_large\" id=\"penetration-testing\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default reversed stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/11-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/11-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/11-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/11-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/11.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Penetration Testing<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We simulate real-world attacks to <strong>test your defences and uncover exploitable weaknesses<\/strong>. Our insights guide corrective action and strengthen resilience.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"d739\"><button class=\"w-tabs-section-header\" aria-controls=\"content-d739\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-d739\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong>We assess the actual level of exposure<\/strong> of infrastructure, applications, and systems <strong>to controlled attacks<\/strong>, identifying exploitable vulnerabilities, configuration flaws, and security weaknesses that could allow unauthorised access, privilege escalation, or compromise of critical information.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"c9a3\"><button class=\"w-tabs-section-header\" aria-controls=\"content-c9a3\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-c9a3\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong>We simulate targeted attacks<\/strong> on internal, external, cloud and application infrastructures, using recognised methodologies (PTES, OWASP Testing Guide, NIST 800-115, etc.) and real exploitation techniques. We validate each vulnerability through practical testing and document the impact scenarios, prioritising risks according to criticality and scope in the business.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"rc75\"><button class=\"w-tabs-section-header\" aria-controls=\"content-rc75\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-rc75\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i><strong>Confirmation of<\/strong> truly exploitable <strong>vulnerabilities<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Identification of <strong>real intrusion scenarios.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Reduction<\/strong> of critical <strong>security risks.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Improvement of technical controls<\/strong> and defensive configurations.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Clear evidence for <strong>remediation plans.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Support for <strong>audits and regulatory compliance.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"red-team\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Red team Exercices<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We conduct <strong>advanced adversarial simulations<\/strong> to evaluate your organisation\u2019s detection and response capabilities end-to-end. These exercises enhance readiness and resilience.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"t75f\"><button class=\"w-tabs-section-header\" aria-controls=\"content-t75f\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-t75f\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We assess the <strong>organisation&#8217;s actual capacity<\/strong> to prevent, detect and respond <strong>to advanced persistent threats (APTs)<\/strong>, identifying technical, operational and process weaknesses that could enable prolonged intrusions, lateral movement, privilege escalation or exfiltration of sensitive information.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"e9c1\"><button class=\"w-tabs-section-header\" aria-controls=\"content-e9c1\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-e9c1\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We <strong>simulate complete offensive campaigns<\/strong> that replicate tactics, techniques, and procedures used by<strong> real malicious actors or frameworks<\/strong> such as MITRE ATT&amp;CK, including initial access vectors, social engineering, persistence, security control evasion, lateral movement, and impact simulation on critical assets, all in a controlled and authorised environment.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"nc6f\"><button class=\"w-tabs-section-header\" aria-controls=\"content-nc6f\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-nc6f\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i>Realistic validation of<strong> security posture against advanced threats<\/strong> (APT).<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Improvement of detection and response<\/strong> capabilities in the face of complex attacks.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Identification<\/strong> of technical, human and process <strong>gaps<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Strengthening<\/strong> of defensive controls and SOC.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Reduction of <\/strong>detection, response and containment <strong>times<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Increased organisational <strong>resilience to cyber threats.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/10-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/10-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/10-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/10-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/10.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large color_primary\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Why choose Inprosec?<\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">people<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Multidisciplinary team<\/h4><div class=\"w-iconbox-text\"><p style=\"text-align: center;\">At Inprosec we have a multilingual team formed of various academic profiles (engineers, business analysts, auditors, \u2026) who perform their duties assuming the roles of consultants, auditors, project managers, etc.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">signal_cellular_alt<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Continuous improvement<\/h4><div class=\"w-iconbox-text\"><p style=\"text-align: center;\">In a world that is constantly changing, it is fundamental learn and improve to adapt and offer services aligned with the needs of Customers.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox acordeon iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">add_task<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Value proposition<\/h4><div class=\"w-iconbox-text\"><ul style=\"text-align: left;\">\n<li><i class=\"fas fa-check-square\"><\/i>We are not incompatible with audits.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We are independent. We are Consultants.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We do not compete in markets that are unfamiliar to us.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<section class=\"l-section wpb_row height_large\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 class=\"titular\" style=\"text-align: center;\"><span class=\"fina\">Do you want to learn about <\/span>Offensive Security<span class=\"fina\">?<\/span><\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-grid type_grid layout_5303 cols_3 overflow_hidden with_css_animation\" id=\"us_grid_1\" style=\"--gap:0.5rem;\" data-filterable=\"true\"><style>@media (max-width:1024px){#us_grid_1 .w-grid-item{width:50%}}@media (max-width:600px){#us_grid_1 .w-grid-list{margin:0}#us_grid_1 .w-grid-item{width:100%;padding:0;margin-bottom:var(--gap,0px)}}.layout_5303 .w-grid-item-h{background:var(--color-header-middle-bg);color:var(--color-content-text);box-shadow:0 0rem 0rem rgba(0,0,0,0.1),0 0rem 0rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch .layout_5303 .w-grid-item-h:hover{box-shadow:0 0.1rem 0.2rem rgba(0,0,0,0.1),0 0.33rem 1rem rgba(0,0,0,0.15);z-index:4}.layout_5303 .usg_post_title_1{font-size:1.4rem!important;font-weight:700!important}.layout_5303 .usg_vwrapper_1{padding:9% 11% 11% 11%!important}.layout_5303 .usg_post_taxonomy_1{font-weight:700!important;text-transform:uppercase!important;font-size:10px!important;position:absolute!important;top:1.2rem!important;right:1.2rem!important;left:1.2rem!important}.layout_5303 .usg_hwrapper_1{color:var(--color-content-faded)!important;font-size:0.9rem!important}@media (max-width:600px){.layout_5303 .usg_post_title_1{font-size:1.2rem!important}}<\/style><div class=\"w-grid-list\">\t<article class=\"w-grid-item us_animate_fade size_1x1 post-14262 post type-post status-publish format-standard has-post-thumbnail hentry category-information-security category-technical-article\" data-id=\"14262\" style=\"animation-delay:0s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/the-supply-chain-the-true-attack-vector-in-cybersecurity\/\" aria-label=\"The Supply Chain: The True Attack Vector in Cybersecurity\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/the-supply-chain-the-true-attack-vector-in-cybersecurity\/\">The Supply Chain: The True Attack Vector in Cybersecurity<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-02-18T11:05:51+02:00\" title=\"18 February 2026 at 11:05:51 +02:00\">18 Feb at 11:05 am<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/the-supply-chain-the-true-attack-vector-in-cybersecurity\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In the cybersecurity ecosystem, we tend to focus our efforts on development security. We invest significant resources in auditing proprietary&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item us_animate_fade size_1x1 post-13761 post type-post status-publish format-standard has-post-thumbnail hentry category-information-security category-technical-article\" data-id=\"13761\" style=\"animation-delay:0.1s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/strategy-for-preventing-information-leaks-in-microsoft-environments\/\" aria-label=\"Strategy for Preventing Information Leaks in Microsoft Environments\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/strategy-for-preventing-information-leaks-in-microsoft-environments\/\">Strategy for Preventing Information Leaks in Microsoft Environments<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2025-11-20T11:54:10+02:00\" title=\"20 November 2025 at 11:54:10 +02:00\">November 20, 2025<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/strategy-for-preventing-information-leaks-in-microsoft-environments\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In many organizations, the plan to prevent data leaks can be summarized as \u201clet\u2019s implement a DLP.\u201d Solutions such as&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item us_animate_fade size_1x1 post-11939 post type-post status-publish format-standard has-post-thumbnail hentry category-information-security category-technical-article\" data-id=\"11939\" style=\"animation-delay:0.2s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/how-to-implement-amendment-12024-to-iso-iec-270012022\/\" aria-label=\"HOW TO IMPLEMENT AMENDMENT 1:2024 TO ISO\/IEC 27001:2022?\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/how-to-implement-amendment-12024-to-iso-iec-270012022\/\">HOW TO IMPLEMENT AMENDMENT 1:2024 TO ISO\/IEC 27001:2022?<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2024-07-31T09:12:27+02:00\" title=\"31 July 2024 at 09:12:27 +02:00\">July 31, 2024<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/how-to-implement-amendment-12024-to-iso-iec-270012022\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The new amendment affecting the ISO\/IEC 27001:2022 AMD 1:2024 standard is auditable from May 2024 and marks a significant evolution&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div><div class=\"w-grid-preloader\">\t<div class=\"g-preloader type_1\">\r\n\t\t<div><\/div>\r\n\t<\/div>\r\n\t<\/div>\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:3,&quot;pagination&quot;:&quot;none&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;3&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;5303&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;fade&quot;,&quot;overriding_link&quot;:&quot;%7B%22url%22%3A%22%22%7D&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;category&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;information-security&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;,&quot;acf-disabled&quot;],&quot;posts_per_page&quot;:&quot;3&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_ajax_index&quot;:1,&quot;us_grid_filter_params&quot;:[],&quot;us_grid_index&quot;:1,&quot;_us_grid_post_type&quot;:&quot;post&quot;,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large with_img parallax_ver\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1265\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-ordenador-composicion.jpg);\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-9 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Can we help with Offensive Security?<\/h2>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-3 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-btn-wrapper default_align_none laptops_align_none tablets_align_none mobiles_align_center\"><a class=\"w-btn us-btn-style_1\" title=\"Contact\" href=\"http:\/\/inprosec.com\/contacto\/\"><span class=\"w-btn-label\">Contact with us<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"The new amendment affecting the ISO\/IEC 27001:2022 AMD 1:2024 standard is auditable from May 2024 and marks a significant evolution in integrating sustainability alongside organizational security. This amendment was published by the International Organization for Standardization (ISO) on February 23, 2024, affecting sections 4.1 Understanding the organization and its context and 4.2 Understanding the needs...","protected":false},"author":6,"featured_media":0,"parent":14160,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-13990","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Offensive Security | Inprosec, information security<\/title>\n<meta name=\"description\" content=\"We assess security from an attacker\u2019s perspective to identify real vulnerabilities, anticipate cyberattacks, and effectively strengthen your organization\u2019s defenses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Offensive Security\" \/>\n<meta property=\"og:description\" content=\"We assess security from an attacker\u2019s perspective to identify real vulnerabilities, anticipate cyberattacks, and effectively strengthen your organization\u2019s defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T15:34:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/offensive-security\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/offensive-security\\\/\",\"name\":\"Offensive Security | Inprosec, information security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2026-02-25T14:53:11+00:00\",\"dateModified\":\"2026-02-25T15:34:56+00:00\",\"description\":\"We assess security from an attacker\u2019s perspective to identify real vulnerabilities, anticipate cyberattacks, and effectively strengthen your organization\u2019s defenses.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/offensive-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/offensive-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/offensive-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/servicios\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Offensive Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Offensive Security | Inprosec, information security","description":"We assess security from an attacker\u2019s perspective to identify real vulnerabilities, anticipate cyberattacks, and effectively strengthen your organization\u2019s defenses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/","og_locale":"en_US","og_type":"article","og_title":"Offensive Security","og_description":"We assess security from an attacker\u2019s perspective to identify real vulnerabilities, anticipate cyberattacks, and effectively strengthen your organization\u2019s defenses.","og_url":"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/","og_site_name":"Inprosec","article_modified_time":"2026-02-25T15:34:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/","url":"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/","name":"Offensive Security | Inprosec, information security","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2026-02-25T14:53:11+00:00","dateModified":"2026-02-25T15:34:56+00:00","description":"We assess security from an attacker\u2019s perspective to identify real vulnerabilities, anticipate cyberattacks, and effectively strengthen your organization\u2019s defenses.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/offensive-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.inprosec.com\/en\/servicios\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.inprosec.com\/en\/services\/information-security\/"},{"@type":"ListItem","position":4,"name":"Offensive Security"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/13990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13990"}],"version-history":[{"count":4,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/13990\/revisions"}],"predecessor-version":[{"id":14238,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/13990\/revisions\/14238"}],"up":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14160"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}