Resource Center
Subscribe to AlertsWelcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Category:
Tags:
September 13, 2021 | Attack Blogs
On August 25, 2021, Atlassian released a security advisory for CVE-2021-26084, an OGNL injection vulnerability found within a component of Confluence Server…September 10, 2021 | Whitepapers
Credential attacks bypass traditional defenses and cause billions in damage. Learn why they work, what’s at risk, and how Horizon3.ai…September 5, 2021 | Attack Paths
After my last walkthrough of a machine named Blue on the Hack The Box platform, I received some flak from…September 4, 2021 | Attack Blogs
In August, Orange Tsai released details and also spoke at BlackHat and DEFCON detailing his security research into Microsoft Exchange. His latest blog post…August 27, 2021 | Attack Blogs
The engineering team has been working tirelessly to improve the "what to wow" user experience, add more attack content, add…August 27, 2021 | Attack Paths
My friends tell me it’s in vogue these days for pentesters to write up walk-throughs of challenge boxes from Hack…August 17, 2021 | Whitepapers
Learn why regulatory compliance is not enough for true cybersecurity. Discover how continuous automated pentesting and network segmentation help you…July 29, 2021 | Blogs
Being a #learnitall, Lesson 1: Be Open to Be Wow’d Most of the startup advice out there is pretty clear: get…March 30, 2021 | Webinar Replays
In the world of network security, compliance is the bare minimum. Compliance is locking your door, but what about your…March 8, 2021 | Disclosures
Zabbix is an enterprise IT network and application monitoring solution. In a routine review of its source code, we discovered…