white text on blue background visualizing the overwhelming amount of data in pen testing that can lead to false positives
How to reduce false positives when pen testing web...
Application Security
In the context of penetration (pen) testing, false positives are where the testing tools or methods identify a security vulnerability...
press release
Belsen Group: Analyzing a new and ambitious threat group
Research & Threat Intel
On January 14th, 2025, Belsen Group emerged in the underground forum Breach Forums publishing a list of sensitive data extracted...
Six steps for running a successful security program
Cybersecurity News
Starting a security program can be challenging for some organizations, especially running a mature program across a large business. Resourcing,...
executive intelligence
Threat Context monthly: Executive intelligence briefing for January 2025
Research & Threat Intel
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news...
Outpost24’s Capture the Flag event recap: “json returns”
Application Security
On the crisp morning of December 13th, 2024, as the clock struck 09:59 CET, anticipation filled the air. Around the...