press release
Exploiting trust: Weaponizing permissive CORS configurations
Application Security
If you’re a pentester, or a consumer of application security pentest reports, you’ll probably have come across Cross-Origin Resource Sharing...
Threat Context Monthly: Executive intelligence briefing for September 2024
Research & Threat Intel
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news...
press release
Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities
Research & Threat Intel
Crystal Rans0m is a previously undocumented hybrid ransomware family developed in Rust programming language seen for the first time in...
press release
What security lessons can you learn from your attack...
EASM
Increasing digitalization and connectivity mean the attack surfaces of most organizations are growing. This means more IT assets to track...
press release
CTEM step-by-step guide | Stage one: Scoping
CTEM
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of...