Computer screen with a cryptocurrency symbol
Analyzing the Gonjeshke Darande attack on Iranian crypto exchange Nobitex
Cybersecurity News
The cyberattack by Gonjeshke Darande on Nobitex (Iran’s largest cryptocurrency exchange) made global headlines, not only for its scale, but...
Graphic for blog on OAuth vulnerabilities
Tokens & traps: Seven common OAuth vulnerabilities (plus mitigations)
Application Security
In the world of modern web applications, the OAuth flow is our trusty gatekeeper, enabling seamless logins and secure data...
EASM buyer's guide
EASM Buyer’s Guide 2025: A guide for a futureproof...
EASM
Your external attack surface is growing — whether you’re aware of it or not. Cloud migration, IoT, AI, and remote...
press release
Microsoft Patch Tuesday – June 2025
Patching updates
Today marks Microsoft Patch Tuesday for June 2025, with 66 vulnerabilities addressed. This update includes two zero-day vulnerabilities and several...
RBVM graphic
OutscanNX: Reduce alerts and remediate what matters with RBVM
Vulnerability Management
Last year, nearly 60% of cyber compromises were directly attributable to unpatched vulnerabilities – flaws that organizations knew about but...