Blog
Perspective & Findings
As our experts uncover critical finders, we find it only necessary to keep you informed. From perspective on recent threats to best practices in security we cover it.
Featured Blog Post
Don’t Let Application File Uploads Become Malware Downloads
While most cybersecurity strategies are focused on the endpoint there is an overlooked risk that needs attention: your application file uploads.
Recent Blog Posts
SHIM Me What You Got: Manipulating Shim and Office for Code Injection
September 18, 2024