Back to blog

Eyal Katz

A Developer’s Guide to openssl_client

A Developer’s Guide to openssl_client

You’ve spent several hours meticulously designing your application, ensuring that every line of code is flawless. Everything looks perfect, and you deploy it with confidence. But

Cyber Resilience Strategy: How to Build a Strong Framework

Cyber Resilience Strategy: How to Build a Strong Framework

Your team is racing against the clock to meet an important deadline. Cybercriminals, however, wait behind the scenes for the right opportunity to attack. It takes

The Definitive API Security Testing Checklist

The Definitive API Security Testing Checklist [XLS download]

What would happen if a malicious actor managed to access your API without authorization and compromise sensitive user data? The repercussions can be horrendous. You could

5 Examples of Dependency Confusion Attacks

5 Examples of Dependency Confusion Attacks

Are you still running your package pipeline on default settings and grabbing libraries straight from public repos? Big yikes. That’s rolling out the red carpet for

Subdomain takeover: 12 Ways to Prevent this Attack

Subdomain takeover: 12 Ways to Prevent this Attack

Subdomain takeovers don’t happen because attackers are geniuses. They happen because DNS records get messy. It’s not exactly an exciting gig to track old services or

Secure Your CI/CD Pipelines: 7 Best Practices You Can’t Ignore

Secure Your CI/CD Pipelines: 7 Best Practices You Can’t Ignore

What’s the difference between an unsupervised toddler with markers and an unsecured CI/CD pipeline? Both look fine at first, but chaos is inevitable. While a toddler

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What if your most personal chats, the very foundation of your digital existence, were exposed?  Unfortunately, that’s precisely what happened with the Salt Typhoon Hack on

A Developer's Guide to Running an SCA Scan

A Developer’s Guide to Running an SCA Scan

Your IT infrastructure is a complicated network of systems and activities that generate massive volumes of data every second. Hidden within this data stream is the

A Step-by-Step Guide to the Remote Code Execution Vulnerability

A Step-by-Step Guide to the Remote Code Execution Vulnerability

What if the very core of your company—the digital ecosystem you painstakingly built—is under attack? If an invisible enemy gets illegal access and begins manipulating data

Stop leaks at the source!