Back to blog

Eyal Katz

Subdomain takeover: 12 Ways to Prevent this Attack

Subdomain takeover: 12 Ways to Prevent this Attack

Subdomain takeovers don’t happen because attackers are geniuses. They happen because DNS records get messy. It’s not exactly an exciting gig to track old services or

Secure Your CI/CD Pipelines: 7 Best Practices You Can’t Ignore

Secure Your CI/CD Pipelines: 7 Best Practices You Can’t Ignore

What’s the difference between an unsupervised toddler with markers and an unsecured CI/CD pipeline? Both look fine at first, but chaos is inevitable. While a toddler

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What if your most personal chats, the very foundation of your digital existence, were exposed?  Unfortunately, that’s precisely what happened with the Salt Typhoon Hack on

A Developer's Guide to Running an SCA Scan

A Developer’s Guide to Running an SCA Scan

Your IT infrastructure is a complicated network of systems and activities that generate massive volumes of data every second. Hidden within this data stream is the

A Step-by-Step Guide to the Remote Code Execution Vulnerability

A Step-by-Step Guide to the Remote Code Execution Vulnerability

What if the very core of your company—the digital ecosystem you painstakingly built—is under attack? If an invisible enemy gets illegal access and begins manipulating data

The Essential Cloud Native Security Tutorial

The Essential Cloud Native Security Tutorial

The cloud gives you agility, speed, and flexibility – but it also opens new doors for attackers.  For DevOps teams, every line of code, every container,

ISO 27001:2022 Controls List: Everything You Need to Know

ISO 27001:2022 Controls List: Everything You Need to Know

Imagine a world where you can easily protect your company’s important data while ensuring compliance with strict security guidelines. ISO 27001:2022 promises just that. Because data

8 Steps to Mitigate Supply Chain Risk in Cybersecurity

8 Steps to Mitigate Supply Chain Risk in Cybersecurity

You don’t control most of the code in your software. Unfortunately, that’s the reality of today. Open-source libraries, third-party components, and vendor integrations make up the

The Essential LLM Security Checklist

The Essential LLM Security Checklist

Large language models (LLMs) are transforming how we work and are quickly becoming a core part of how businesses operate. But as these powerful models become

Stop leaks at the source!