Latest posts from OP Innovate

LATEST BLOG

Efficiency and Effectiveness: Achieving Robust Security through Hybrid Penetration Testing

TL;DR Introduction: In today's ever-evolving landscape of cybersecurity threats, organizations face an unprecedented need to strengthen their defense mechanisms and protect their digital assets. Penetration…

Read more >

 Sharing the SOC2 Audit Journey at AI21 Labs

At OP Innovate, we offer a range of services to our customers, including Pen Testing as a service (PTaaS) and Incident response. Another service we…

Read more >

Sharing the SOC2 Audit Journey

How to Defend Against MOVEit Attacks & Safeguard Your Organization

In a concerning turn of events, multiple major organizations have recently confirmed falling victim to the pervasive MOVEit transfer attack. As cybersecurity breaches continue to…

Read more >

A CISO’s Guide To Penetration Tests

Penetration testing (PT) has benefitted organisations for years. The increase in supply and demand of this is driven by a number of factors, including the…

Read more >

Can Low Code-No Code and Security go together?

Low-Code No-Code (LCNC) platforms provide a graphical user interface (GUI) that allows users to create custom applications without the need to write code. These popular…

Read more >

Buhti Ransomware

On Feb 15, 2023, the OP Innovate incident response team responded to multiple ransom attacks being carried out simultaneously on US companies. Some were perpetrated…

Read more >

BUHTI Ransomware

Broken Access Control in REST APIs – Shields Up 🛡️ !

Unfortunately, I have a long relationship with Broken Access Control (BAC) in most of its forms. As a research leader, I often encounter critical security…

Read more >

DM Apps at Work: Congrats, Cyber Security Risk!

As technology advances, we tend to think that advances in security should run in parallel. This is only partly true. End to-end encryption is now…

Read more >

How I found a CVE in a 4 milion (!) active users of WordFence

One of our goals at OP Innovate is to protect our clients and partners at all times. During a recent penetration testing engagement, the testing…

Read more >

Cybersecurity Best Practice

Under Cyber Attack?

Fill out the form and we will contact you immediately.