press release
How to shield your attack surface from SSL misconfigurations
EASM
When we carry out an assessment of an organization’s attack surface, it’s often SSL (Secure Sockets Layer) misconfigurations (and other...
press release
Operation Magnus: Analyzing the cybercrime community reaction
Research & Threat Intel
International cooperation has become crucial to disrupt the operations of malicious cybercrime actors. A prime example of this is ‘Operation...
executive intelligence
Threat Context Monthly: Executive intelligence briefing for October 2024
Research & Threat Intel
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news...
press release
CTEM step-by-step guide | Stage two: Discovery
CTEM
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of...
press release
Exploiting trust: Weaponizing permissive CORS configurations
Application Security
If you’re a pentester, or a consumer of application security pentest reports, you’ll probably have come across Cross-Origin Resource Sharing...