More Articles

Three Ways to Level Up Your Security Posture
Read Article

What Are the Key Elements of a Strong Vulnerability Report?
Read Article

Top 5 Cybersecurity Trends for 2023
Read Article

Log4j One Year Later: What Have We Learned?
Read Article

Beyond the OWASP Top 10: What Are the Next Big Threats to Watch?
Read Article

Why a Proactive Approach Is Better for Your Cybersecurity Program
Read Article

Announcing Inspectiv's Series A
Read Article

Source Code Reconstruction from .git Directory Exposure
Read Article

Two Years and Counting: Evisort's Journey with Inspectiv
Read Article

SSO SAML Vulnerabilities and Token Attacks
Read Article

OWASP Top 10 Vulnerabilities and Other Projects to Follow
Read Article

Broken Authentication and IDOR – A Big but Solvable Problem
Read Article

Phishing and Ransomware Attacks – There is a Connection
Read Article