12 Sep 2023
A robust EASM strategy demands a proactive approach, constant vigilance, and an emphasis on education and collaboration. By following our...
06 Sep 2023
In this blog, one of our Application Security Auditors takes a look at the new HTTP request vulnerability, gives a...
30 Aug 2023
A detailed walkthrough of how a phishing kit can be used to bypass MFA on Microsoft 365 accounts.
23 Aug 2023
This blog compares traditional approaches to vulnerability management to a risk-based one. Learn about the differences between the two, and...
15 Aug 2023
KrakenLabs have observed key actors and groups the dark artificial intelligence ecosystem, exploring the business of selling and developing artificial...