Skip to main content

Cybersecurity Resources

Latest thinking and useful insights on the changing landscape of cybersecurity.


How to improve application security with Pentesting as a Service

Wednesday 28 September at 2.00 PM CEST / 8.00 AM ET


Everything you need to know about Jester Stealer

Learn how Jester Stealer operates and affiliated stealer groups utilizing Jester attack techniques to launch similar malware attacks.


A fresh look into the underground card shop ecosystem

We provide insights on some of the most relevant underground card shops, which types of products are offered, their prices, and related threat actors and business models.


Why API security matters and how to get it right

We will discuss why continuous API security testing is critical to securing your applications and reducing risk of API hacking in the wild


2022 Web Application Security for Chemical Manufacturing Report

60% of the top chemical manufacturing applications are critically exposed with a high susceptibility for exploit


MRTI feed Datasheet

Adaptive and accurate intelligence streams at your fingertips

In-person CISO event on modern AppSec and DevSecOps

NEW DATE: Thursday,19 May 2022 - KPMG Office, Amstelveen


Malware Module Datasheet

Aggressively hunt for targeted malware


Social Media Module Datasheet

Monitor your organization’s digital footprint

Looking for anything in particular?

Type your search word here