Latest posts from OP Innovate

LATEST BLOG

Eye of the Storm: Dissecting the Playbook of Cyber Toufan

How an Iranian-Linked Group Turned Simple Security Weaknesses into Mass Breaches By Matan Matalon, Filip Dimitrov The digital frontlines of the Israel-Gaza conflict have rapidly…

Read more >

cyber toufan

SAP Zero – Frostbite: How Russian RaaS Actor Qilin Exploited CVE-2025-31324 Weeks Before its Public Disclosure

CVE-2025-31324 hit the security world like a tsunami - an easily exploitable SAP vulnerability affecting enterprise environments across the globe. But while most assumed its…

Read more >

CVE-2025-31324

Disrupting Handala: Did OP Innovate Help Silence a Major Cyber Threat?

The Handala group has been one of the most active threat actor groups targeting Israeli organizations and digital infrastructure since late 2023.  On February 9th,…

Read more >

handala

Inside RSA 2025: Our Biggest Takeaways from the World’s Leading Cybersecurity Conference

Expanding our knowledge and innovating is at the core of what we do at OP Innovate. That’s why attending the RSA conference for the first…

Read more >

rsa conference

6 Reasons Why Ongoing Pentesting is More Effective Than Periodic Assessments

For long, penetration testing served as a snapshot in time for security posture. While this approach helps organizations identify critical vulnerabilities, it fails to account…

Read more >

BurpX: Hack Smarter, Report Faster

The Burp Suite AI Reporter Plugin is designed to eliminate the repetitive, time-consuming aspects of vulnerability documentation, allowing cyber researchers to dedicate their expertise to…

Read more >

Burpx Feature

How to Protect Your Organization from LLM Attacks

In the most recent “The State of AI” report by McKinsey & Co., 78% of respondents revealed that their organization uses AI in at least…

Read more >

LLM security

Why CREST Certification Matters for Penetration Testing

Penetration testing is a valuable investment, but its effectiveness depends heavily on the quality and credibility of the testing provider. Not all penetration testing is…

Read more >

Why CREST certification is important for Penetration Testing

How to Get the Most Out of Your Security Budget in 2025

One of the main factors that prevent organizations from creating a robust cybersecurity program is how tight budgets force them into making short-term, reactive decisions…

Read more >

security budget 2025

Cybersecurity Best Practice

How to Get the Most Out of Your Security Budget in 2025

One of the main factors that prevent organizations from creating a robust cybersecurity program is how tight budgets force them into making short-term, reactive decisions…

Read more >

security budget 2025

Black Basta Leverages Microsoft Teams for Advanced Social Engineering Ransomware Tactics

October 29, 2024 | OP Innovate Several cybersecurity publications and experts are warning against a new tactic being used by  Black Basta ransomware operators -…

Read more >

black basta cti

The EVJORERJG Scam: A Deep Dive into Fraudulent Crypto Trading Tactics

The EVJORERJG app, launched under the guise of a legitimate financial trading platform, uses deceptive tactics to lure users, starting with a convincing demo mode…

Read more >

Top 10 Trends Shaping PTaaS Security in 2024: An Expanded Insight from OP Innovate

As the digital landscape continues to evolve, so does the field of Penetration Testing as a Service (PTaaS). At OP Innovate, we've been at the…

Read more >

TOP 10 PTaaS TRENDS

Red Team Penetration Testing: Creating Realistic Attack Scenarios

Red team penetration testing simulates real-world attacks to perform an assessment on effectiveness of security defenses.

Read more >

red team penetration testing

API Penetration Testing Tools and Techniques: Best Practices

Learn the tools, techniques, and best practices for performing thorough API penetration testing to uncover vulnerabilities in web service interfaces before attackers can exploit them.

Read more >