Latest Posts

OSINT

Our OSINT investigations over the past year have uncovered an alarming reality: login credentials from your employees are being traded, shared, and weaponized across the dark web and public breach databases.

Phishing Simulation

Our Offensive Security team conducted phishing simulation campaigns across multiple client organizations throughout the year. The results reveal uncomfortable truths about human vulnerability to social engineering—and why technical controls alone aren’t enough.

European Security Assessment Report 2025

Our offensive security department has completed comprehensive penetration testing and vulnerability assessments across numerous European enterprises over the past year.

EDR vs XDR

Cybersecurity tools like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) are made to assist organizations in detecting and preventing cyber threats.

GLOBSEC 2023 Bratislava Forum

Like last year, the prestigious international security conference GLOBSEC 2023 Bratislava Forum was held in Bratislava, which was attended by several well-known guests, including the highest state representatives of France, Ukraine, and Slovakia.

Security Orchestration, Automation, and Response

Security Orchestration, Automation, and Response is referred to as SOAR. It is a kind of technology that helps organizations enhance their security operations by automating and orchestrating a variety of processes and workflows.

Insider Threat Detection and Monitoring

Insider Threat Detection and Monitoring is a crucial aspect of an organization’s cybersecurity strategy, as it focuses on identifying and mitigating risks posed by internal actors, such as employees, contractors, or partners.