common vulnerabilities on your external attack surface
The most common vulnerabilities in your external attack surface 
EASM
A robust EASM strategy demands a proactive approach, constant vigilance, and an emphasis on education and collaboration. By following our...
HTTP request smuggling
Using HTTP request smuggling to hijack a user’s session...
Application Security
In this blog, one of our Application Security Auditors takes a look at the new HTTP request vulnerability, gives a...
phishing microsoft 365
The Phishing-as-a-Service platform targeting Microsoft 365 customers
Research & Threat Intel
A detailed walkthrough of how a phishing kit can be used to bypass MFA on Microsoft 365 accounts.
risk-based strategies
Vulnerability management: traditional approaches vs. risk-based strategies 
Vulnerability Management
This blog compares traditional approaches to vulnerability management to a risk-based one. Learn about the differences between the two, and...
cyber-intrusion
Dark AI tools: How profitable are they on the...
Research & Threat Intel
KrakenLabs have observed key actors and groups the dark artificial intelligence ecosystem, exploring the business of selling and developing artificial...