EASM
20 Aug 2025
Shadow IT has evolved from an occasional nuisance to a pervasive security challenge that affects every organization. These unauthorized applications, services, and devices operating outside of IT oversight create blind spots in your security posture that attackers are increasingly exploiting.…
Patching updates
13 Aug 2025
Today marks Microsoft Patch Tuesday for August 2025. There are 111 vulnerabilities that have been addressed this time around. This is quite a few, although only a few are higher severity. As always, make sure to patch your systems as…
Digital Risk Protection
12 Aug 2025
2025 has been a summer of high-profile breaches. This post will focus on four notable and high-profile victims: Chanel, Google, Air France, and KLM. Although the companies and exact data sets differ, these breaches share a clear pattern: attackers compromised…
Application Security
12 Aug 2025
It’s become pretty standard to expect the help of AI with automating tasks, with penetration testing being no exception. As AI-driven tools grow more sophisticated, some have posed the question: could these systems render the traditional human pen tester obsolete…