Post Archive

Post Archive

Top 10 Common Web Application Vulnerabilities and How to Mitigate Them

This expert analysis covers the top 10 threats to your web application

Read more >

top 10 web application vulnerabiltiies

OP Innovate Discovers High risk vulnerabilities in Iris: CVE-2024-25624 & CVE-2024-34060:

OP Innovate discovered two critical vulnerabilities (CVE-2024-25624 and CVE-2024-34060) in the Iris DFIR platform, allowing remote code execution via Server-Side Template Injection and arbitrary file…

Read more >

Iris featured image

Penetration Testing vs. Red Teaming: Which Proactive Security Approach Should You Choose?

Penetration Testing vs. Red Teaming: Which Proactive Security Approach Should You Choose? In the world of offensive security, there are two approaches that people often…

Read more >


Penetration Testing Checklist: Process, Tools & Techniques

A penetration test (or pen test) is a simulated cyberattack against an application, system, or network to identify vulnerabilities that can be exploited by real…

Read more >

Penetration testing checklist feature

The Importance of Incident Response for Building Cyber Resilience

Discover why incident response planning is a worthy investment in today’s security landscape and the options you have for building out a comprehensive incident response…

Read more >


Brazilian Hackers Breach Large Cellular Services Company

A major US-based cellular service company recently fell victim to a cyber attack orchestrated by Brazilian hackers. The incident highlights the importance of robust cybersecurity…

Read more >

brazilian hackers attack cellular company

Karma Below 80 Performs cyber attack on Prominent Israeli Engineering and Construction Company

A well-known Tel Aviv-based engineering and construction company was compromised in mid March in a significant supply-chain-based cyber attack conducted by the group known as…

Read more >

Lord Nemesis Strikes: Supply Chain Attack on the Israeli Academic Sector

Lord Nemesis, an Iranian hacktivist group, breaches Rashim Software and its Israeli academic clients in a supply chain attack. Learn about the attack, the risks…

Read more >

Lord Nemesis Banner

The Irony of the LockBit Takedown: Even Ransomware Groups Need to Patch

In a groundbreaking maneuver, the UK's National Crime Agency (NCA) orchestrated a meticulously planned Lockbit takedown, an infamous ransomware gang that has left an indelible…

Read more >

lockbits downfall
Under Cyber Attack?

Fill out the form and we will contact you immediately.