executive intelligence
Threat Context monthly, April 2025: EncryptHub & Media Land leak
Research & Threat Intel
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news...
impersonation-attacks
Homograph attacks: How hackers exploit look-alike domains
EASM
Several years ago, a security researcher discovered a vulnerability in Google Chrome that allowed fake domains to bypass the browser’s...
press release
Responsible vulnerability disclosure: Why it matters
Cybersecurity News
The concept of responsible disclosure is a simple one. If you find a vulnerability, you let the affected organization or...
Blue open lock as symbol for authentification
6 common authentication vulnerabilities in web apps  
Application Security
Authentication is used by most web applications. Both for letting users have access to individual accounts, but also for protecting...
Microsoft Patch Tuesday – April 2025
Patching updates
Today marks Microsoft’s Patch Tuesday for April 2025, addressing a total of 126 vulnerabilities. This is in addition to nine...