
Software supply chain compromise explained: What you need to know and lessons learned.
Event
Software supply chain compromise explained: What you need to know and lessons learned.
Event
December 11, 2020
Our team describes how single-factor authentication attack surfaces can be exposed in the AirWatch MDM suite and what steps to take to mitigate risks.
Blog
November 05, 2020
A security vulnerability has been found in the Black Duck Hub REST API Python project (“blackduck” in the PyPI repository). Read more.
Blog
October 13, 2020
Application threat modeling decomposes application architecture into security-relevant components to reveal threats and potential risks.
Blog
September 30, 2020
Hackers can use the username structure and deployed technologies in an online document’s metadata to successfully breach the perimeter.
Blog
September 17, 2020
Information security strategies often overlook the threats posed by weaknesses in its physical security posture.
Blog
September 11, 2020
Moving functionality from Java to native implementations in Android increases obscurity but not security.
Tool
September 11, 2020
Moving functionality from Java to native implementations in Android increases obscurity but not security.
Blog
September 02, 2020
Two experienced red teamers describe successful engagements and how to counter attack chains.
Blog
August 25, 2020
A quick walkthrough of the general steps taken to solve an iOS CTF.
Blog
August 24, 2020
The standalone script can be used directly with Frida in order to monitor basic BLE traffic between a mobile device (central) and a BLE peripheral.
Tool
August 20, 2020
Our new technical cybersecurity resource, Source Zero, focuses on red and blue team security capabilities.
Video