Skip to main content

Cybersecurity Resources

Latest thinking and useful insights on the changing landscape of cybersecurity.


RBVM Datasheet

Automated vulnerability assessment and threat intelligence


The Rising Threat of Traffers

A new dynamic in the Credential Theft Ecosystem


Account Takeover in Azure's API Management Developer Portal

We will walk you through a vulnerability he recently discovered in Azure's API Management Developer Portal that can be exploited to perform an account takeover attack


Pentesting as a Service datasheet

Leverage an effective combination of manual testing with automation


How to improve application security with Pentesting as a Service

We explain how to increase your security testing efficiency and reduce risk with pentesting as a service (PTaaS) in Gartner’s latest Hype Circle for Security Operations


Everything you need to know about Jester Stealer

Learn how Jester Stealer operates and affiliated stealer groups utilizing Jester attack techniques to launch similar malware attacks.


A fresh look into the underground card shop ecosystem

We provide insights on some of the most relevant underground card shops, which types of products are offered, their prices, and related threat actors and business models.


Why API security matters and how to get it right

We will discuss why continuous API security testing is critical to securing your applications and reducing risk of API hacking in the wild


2022 Web Application Security for Chemical Manufacturing Report

60% of the top chemical manufacturing applications are critically exposed with a high susceptibility for exploit

Looking for anything in particular?

Type your search word here