Latest posts from OP Innovate
LATEST BLOG
Eye of the Storm: Dissecting the Playbook of Cyber Toufan
How an Iranian-Linked Group Turned Simple Security Weaknesses into Mass Breaches By Matan Matalon, Filip Dimitrov The digital frontlines of the Israel-Gaza conflict have rapidly…
Read more >

SAP Zero – Frostbite: How Russian RaaS Actor Qilin Exploited CVE-2025-31324 Weeks Before its Public Disclosure
CVE-2025-31324 hit the security world like a tsunami - an easily exploitable SAP vulnerability affecting enterprise environments across the globe. But while most assumed its…
Read more >

Disrupting Handala: Did OP Innovate Help Silence a Major Cyber Threat?
The Handala group has been one of the most active threat actor groups targeting Israeli organizations and digital infrastructure since late 2023. On February 9th,…
Read more >

Inside RSA 2025: Our Biggest Takeaways from the World’s Leading Cybersecurity Conference
Expanding our knowledge and innovating is at the core of what we do at OP Innovate. That’s why attending the RSA conference for the first…
Read more >

6 Reasons Why Ongoing Pentesting is More Effective Than Periodic Assessments
For long, penetration testing served as a snapshot in time for security posture. While this approach helps organizations identify critical vulnerabilities, it fails to account…
Read more >

BurpX: Hack Smarter, Report Faster
The Burp Suite AI Reporter Plugin is designed to eliminate the repetitive, time-consuming aspects of vulnerability documentation, allowing cyber researchers to dedicate their expertise to…
Read more >

How to Protect Your Organization from LLM Attacks
In the most recent “The State of AI” report by McKinsey & Co., 78% of respondents revealed that their organization uses AI in at least…
Read more >

Why CREST Certification Matters for Penetration Testing
Penetration testing is a valuable investment, but its effectiveness depends heavily on the quality and credibility of the testing provider. Not all penetration testing is…
Read more >

How to Get the Most Out of Your Security Budget in 2025
One of the main factors that prevent organizations from creating a robust cybersecurity program is how tight budgets force them into making short-term, reactive decisions…
Read more >

Cybersecurity Best Practice
How to Get the Most Out of Your Security Budget in 2025
One of the main factors that prevent organizations from creating a robust cybersecurity program is how tight budgets force them into making short-term, reactive decisions…
Read more >

Black Basta Leverages Microsoft Teams for Advanced Social Engineering Ransomware Tactics
October 29, 2024 | OP Innovate Several cybersecurity publications and experts are warning against a new tactic being used by Black Basta ransomware operators -…
Read more >

The EVJORERJG Scam: A Deep Dive into Fraudulent Crypto Trading Tactics
The EVJORERJG app, launched under the guise of a legitimate financial trading platform, uses deceptive tactics to lure users, starting with a convincing demo mode…
Read more >

Top 10 Trends Shaping PTaaS Security in 2024: An Expanded Insight from OP Innovate
As the digital landscape continues to evolve, so does the field of Penetration Testing as a Service (PTaaS). At OP Innovate, we've been at the…
Read more >

Red Team Penetration Testing: Creating Realistic Attack Scenarios
Red team penetration testing simulates real-world attacks to perform an assessment on effectiveness of security defenses.
Read more >

API Penetration Testing Tools and Techniques: Best Practices
Learn the tools, techniques, and best practices for performing thorough API penetration testing to uncover vulnerabilities in web service interfaces before attackers can exploit them.
Read more >
