Blog

Blog
Facial Recognition: Options and Procedures for Opting Out

During a recent visit to our Estonian office, our remote team engaged in discussions about travel experiences. David Ruiz, our…

Blog
Emergence of Advanced ‘Fake Interview’ Schemes Utilizing 35 npm Packages for Malware Distribution

The recent resurgence of North Korea’s ‘Contagious Interview’ campaign has emerged as a significant threat, targeting job seekers through malicious…

Blog
Ongoing nOAuth Vulnerability Impacting 9% of Microsoft Entra SaaS Applications Two Years Post-Discovery

Recent research has highlighted ongoing risks associated with a known security vulnerability in Microsoft’s Entra ID, which may allow malicious…

Blog
Hackers Exploit Open-Source Tools to Target Financial Institutions in Africa

Unit 42, the research team at Palo Alto Networks, has uncovered a malicious campaign targeting financial organizations throughout Africa. This…

Blog
NSA and CISA Advocate for the Adoption of Memory Safe Programming Languages to Enhance Security

A renewed call to transition to memory safe languages (MSLs) has been issued by the National Security Agency (NSA) and…

Blog
Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery

A critical vulnerability in Microsoft’s Entra ID continues to expose numerous enterprise applications, two years post-discovery. Semperis, an identity security…