A pen tester’s guide to Content Security Policy
Application Security
In this article, we’ll look at Content Security Policy (CSP) through the eyes of a penetration tester. We will outline...
Cybersecurity predictions for 2023
Cybersecurity News
In light of the numerous large-scale cyberattacks witnessed in the last year, 2023 promises to be an exciting time for...
ISO 27002 puts threat intelligence center stage
Compliance & Regulations
The updated ISO 27002 adds 11 new controls spanning a range of security services, including the addition of threat intelligence...
Network Graph
Eight reasons you should implement EASM
EASM
In modern cybersecurity, it’s not just about what’s inside your network—it’s about what’s exposed to the outside world. With the...
hacker image
Threat Actor Profile – Sodinokibi ransomware
Research & Threat Intel
Meet "Sodinokibi" this month, the threat group behind the eponymous Sodinokibi ransomware, also known as “REvil”, to understand their tactics...