Predictions for EASM in Tackling the Rise of Trojanised Gaming Tools and RATs
Outsmarting PyStoreRAT: Protecting Your Organization from Fake GitHub Repositories
AI-Driven Phishing Kits: The New Wave of Credential Theft
The Growing Threat of Credential Theft via npm Preinstall Attacks and How EASM Can Help
Boosting SIEM and SOAR Effectiveness with EASM
Living off the Land: How Attackers Hide in Plain Sight
The Small Changes That Lead to Big Breaches
Beyond the Obvious: Emerging OSINT Sources in 2025
The New Hacker Mindset
How Website Takedowns Really Work
From Reconnaissance to Resilience
AI-Driven Phishing Just Got Personal
Why Security Debt Is the New Technical Debt
The UK Cyber Security and Resilience Bill: What You Need to Know
Why The Board Should Care About EASM
Stop Blaming Users, Start Fixing Processes
Document metadata leaks and how attackers exploit them
What Star Wars can teach us about attack surfaces
Why zero trust is the new normal
Making sense of the noise: a new way to use threat intel