hacker image
Dissecting Spring4Shell
Research & Threat Intel
An RCE vulnerability affecting Spring Core’s JDK 9 and later has become a trending topic in cybersecurity networks during the...
press-release
Press Release: Security issues discovered across Europe’s top manufacturers’...
Press Release
UK’s Linde and Johnson Matthey among companies running vulnerable web apps in Outpost24’s Attack surface benchmark for Chemical Manufacturers report...
hacker image
The Russia-Ukraine crisis shakes up the cybercriminal ecosystem
Research & Threat Intel
In this article, we will highlight the most relevant threat actors and attacks that took place in late February 2022,...
How to secure web apps continuously with pen testing...
Application Security
Pen testing is a valuable practice for discovering and remediating exploitable vulnerabilities in code. Legacy pen testing, however, can’t keep...
How to use the MITRE ATT&CK framework with threat...
Vulnerability Management
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations...