Threat Landscape

Protection Beyond the Perimeter Starts Here.

Managing Cloud Data-Loss Risk in A ‘Cloud First’ World

Cloud adoption and services remain among the top trends and IT strategies, as does cyber security. As a result, enterprises, federal agencies and startups alike are adopting a “cloud first” policy in ...

Read More

How to Use JPEXS for a Foolproof Dynamic Flash Analysis

We come across many flash based applications during our penetration tests for customers.

Read More

A New Vulnerability Exposes 900 Million Users to Legitimate Looking Phishing Emails

Our CyberOPS team did it again.

Read More

Why Your Organization May Be More Vulnerable Than You Think To Cross-Site Scripting Attacks

Cross-site scripting (XSS) is one of the greatest security threats organizations face. Malicious codes are injected into otherwise trusted websites using HTML, JavaScript, VBScript, ActiveX and Flash ...

Read More