Case Studies

Case Studies

How I found a CVE in a 4 milion (!) active users of WordFence

One of our goals at OP Innovate is to protect our clients and partners at all times. During a recent penetration testing engagement, the testing…

Read more >

Under the hood of a Smishing campaign

Earlier today our OP Innovate research team received yet another Smishing attempt asking them to provide credit card details

Read more >

Under the hood of a smishing campaign

Email-based attacks in the COVID-19 era

Since life in the shadow of the Covid-19 pandemic became “new normal”, we at OP Innovate have seen an excess of business email compromises (BEC)…

Read more >

N3TW0RM Ransomware IOCS

Explore the N3tw0rm ransomware gang operations targeting Israeli companies for ransom, identify IOCs, and seek cyber protection from OP Innovate

Read more >

Prototype Pollution high vulnerability in ‘mixme’ NPM package

NPM (Node Package Manager) is a gigantic software registry that contains hundreds of thousands of open source Node.js projects in the form of packages.

Read more >

Halloween and Cyber-Security: Malware in Disguise

Ghostly greetings one and all. On Halloween night, children the world over dress up in scary costumes and prowl from house to house, asking wary…

Read more >

Social Engineering Under COVID-19

As a leader of an organization you're always trying to seize the next opportunity while avoiding unnecessary risks and threats. You can prepare clear strategies,…

Read more >

Social Engineering Under COVID-19

DLL Injection Attack in Kerberos NPM package

For those who are not familiar with NPM (Node Package Manager), it is a gigantic software registry that contains hundreds of thousands of open source…

Read more >

DLL Injection Attack in Kerberos NPM package

Everything You Always Wanted to Know About Passwords

Until quite recently, connecting to a website or online service meant simply typing in a username and password. In the early days, one could even…

Read more >