cyber security prediction 2024
The scope of cybersecurity in 2024: Predictions from the...
Application Security
Outpost24’s security experts predict the emerging threats that will shape the cybersecurity landscape in 2024
monitor presence dark web banner
How to monitor your organization’s presence on the dark...
Research & Threat Intel
The importance of checking underground dark web forums for mentions of your organization to mitigate breaches or cyber-attacks.
iso iec 27001 compliance guide
ISO/IEC 27001 compliance guide for CISOs and IT Managers 
Compliance & Regulations
ISO/IEC 27001 compliance guidelines to support the implementation and continuous improvement of managing information security risks.
http2 downgrading request smuggling
Request smuggling and HTTP/2 downgrading: exploit walkthrough
Application Security
Detailed overview and real-world exploit of request smuggling vulnerability from HTTP/2 downgrading.
unveiling-lummaC2
Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for...
Research & Threat Intel
Lumma stealer’s new Anti-Sandbox technique that forces the malware to wait until “human” behavior is detected.