Research & Threat Intel
26 Oct 2023
Earlier this month, the District of Columbia Board of Elections (DCBOE) warned that a threat actor may have gained access to the personal information of their registered voters. This would include personally identifiable information (PII) such as contact details, partial…
Application Security
27 Apr 2023
Vulnerability scanning and penetration testing are vital pieces of the security puzzle, and it's important to understand the difference between the two. Both vulnerability scanning and penetration testing can be used to assess the entire IT infrastructure, but in this…
EASM
17 Nov 2022
In modern cybersecurity, it's not just about what's inside your network—it's about what's exposed to the outside world. With the proliferation of cloud services, third-party integrations, and remote work setups, your organization's external attack surface has grown exponentially. Traditional security…
EASM
01 Apr 2021
As organizations adopt cloud services, remote work, third-party integrations, and digital transformation initiatives, their IT environments have become increasingly complex—and increasingly visible to attackers. Every exposed web server, misconfigured cloud bucket, forgotten subdomain, or unsecured API becomes a doorway that…



