Back to Blog
July 11, 2019
July 04, 2019
Web-Based Supply Chain Attacks in the EnterpriseThe enterprise is being taken by storm by web supply chain attacks, which breach them via third-party vendors. New mitigation approaches must be considered.
June 21, 2019
April 17, 2019
Extended Guide to SafetyNetSafetyNet enables you to protect your app against tampering, fake users, and more. With this tutorial, you'll learn how to set up SafetyNet in your own app.
April 05, 2019
[Case Study] Mitigating Browser Extension AttacksIn this case study, we show how a browser extension can use Man-in-the-Browser features to defeat current security standards and exfiltrate user data.
April 02, 2019
Introduction to Device FingerprintingHow can we tell a real user apart from an attacker? In this article, we explain a possible way to stop attackers with device fingerprinting.
March 08, 2019
12 Must-Follow Online Publications for Cyber Security ProfessionalsHere's our shortlist of 12 of the most informative and engaging cyber security content publications, to help you as a cyber security professional.
March 05, 2019