Our Blog

Home / Blog

Google Docs used for Office 365 credential phishing

Google Docs used for Office 365 credential phishing

Phishers are using Google online services to take over Microsoft online service accounts. Since the onset of the COVID-19 pandemic, many companies have moved much of their workflows online and learned to use new collaboration tools. In particular, Microsoft’s Office...

Make application readiness a part of your IT ecosystem

Make application readiness a part of your IT ecosystem

Do you have a Windows migration coming up? You’ve already done that? Then all your application packaging needs are done and you can just forget about your applications. Just kidding. Tending to the updates necessary for existing applications need just as...

Understanding the most common JavaScript vulnerabilities

Understanding the most common JavaScript vulnerabilities

JavaScript is now the world’s most widely used programming language, found in almost every web application out there. JavaScript vulnerabilities are therefore a major web security risk and understanding them is vital for preventing data breaches and other security...

Miscommunication is at the heart of AppSec challenges

Miscommunication is at the heart of AppSec challenges

Miscommunication breaks things in business. Whether it’s unintentional – based on assumptions or intentional – driven by political motivations, miscommunication is at the heart of most challenges in business today. In our line of work, there’s...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo