Code audit for the Tor Project by 7ASecurity

For the past three years, the Tor Project has been working to improve the tools, resources, and protocols used to monitor the health of the Tor network. This work aims to strengthen the Tor network's resilience and resist relay attacks. As part of this effort, in July and August 2025, 7ASecurity conducted a code audit of those …

What ‘Quality Pentests’ Really Mean: Interview with OWASP Executive Director Andrew van der Stock

OWASP Executive Director Andrew van der Stock interviews 7ASecurity CEO Abraham Aranguren on what “quality pentesting” really means: threat-model driven scoping, researcher-led testing, interim findings, and free fix verification.

Internal Network Pentesting? Here’s What You Should Know

What Happens When the Threat Is Already Inside? Effective internal network penetration testing addresses a classic security fear, much like the line from horror films: 'The call is coming from inside the house'.  In cybersecurity, this is a daily reality. While we spend a lot of time building strong walls to keep attackers out, many …

A Guide to Wireless Network Penetration Testing for Your Business

Protecting Your Data from Wireless Attacks Wireless network penetration testing is the most reliable way to verify that your office Wi-Fi is genuinely secure against invisible threats. Many businesses assume a password is enough protection, but hackers often bypass these basic hurdles with ease.  If your wireless perimeter is weak, an attacker doesn’t need to …