Latest posts from OP Innovate
LATEST BLOG
How to Defend Against MOVEit Attacks & Safeguard Your Organization
In a concerning turn of events, multiple major organizations have recently confirmed falling victim to the pervasive MOVEit transfer attack. As cybersecurity breaches continue to…
Read more >

A CISO’s Guide To Penetration Tests
Penetration testing (PT) has benefitted organisations for years. The increase in supply and demand of this is driven by a number of factors, including the…
Read more >

Can Low Code-No Code and Security go together?
Low-Code No-Code (LCNC) platforms provide a graphical user interface (GUI) that allows users to create custom applications without the need to write code. These popular…
Read more >

Buhti Ransomware
On Feb 15, 2023, the OP Innovate incident response team responded to multiple ransom attacks being carried out simultaneously on US companies. Some were perpetrated…
Read more >

Broken Access Control in REST APIs – Shields Up 🛡️ !
Unfortunately, I have a long relationship with Broken Access Control (BAC) in most of its forms. As a research leader, I often encounter critical security…
Read more >

DM Apps at Work: Congrats, Cyber Security Risk!
As technology advances, we tend to think that advances in security should run in parallel. This is only partly true. End to-end encryption is now…
Read more >

How I found a CVE in a 4 milion (!) active users of WordFence
One of our goals at OP Innovate is to protect our clients and partners at all times. During a recent penetration testing engagement, the testing…
Read more >

Under the hood of a Smishing campaign
Earlier today our OP Innovate research team received yet another Smishing attempt asking them to provide credit card details
Read more >

The Art of the Red Team
This article pulls together some of the tactics and techniques used by OP Innovate researchers during a red team exercise. Please note, tools, tactics and…
Read more >
