Application Security
18 Jun 2025
In the world of modern web applications, the OAuth flow is our trusty gatekeeper, enabling seamless logins and secure data sharing. But its flexibility (designed to handle myriad use cases) is also its Achilles’ heel. A tiny misstep in URI…
Patching updates
10 Jun 2025
Today marks Microsoft Patch Tuesday for June 2025, with 66 vulnerabilities addressed. This update includes two zero-day vulnerabilities and several other high-severity remote code execution vulnerabilities. One of the zero-day vulnerabilities is actively being exploited, so it’s crucial to apply…
Vulnerability Management
09 Jun 2025
Last year, nearly 60% of cyber compromises were directly attributable to unpatched vulnerabilities – flaws that organizations knew about but hadn’t remediated in time. The problem with traditional vulnerability management (VM) approaches is they treat every finding equally, leaving security…
EASM
23 May 2025
External attack surfaces have never been more sprawling, or more vulnerable. As organizations increasingly rely on dynamic, cloud-based infrastructures, and third-party services, digital footprints are only going to carry on growing. So, it’s no surprise many are turning towards External…