Blog

Welcome to our blog. We are regularly sharing our cyber security insights and company updates.

Interview for Safety Detectives blog

Interview for Safety Detectives blog

Our CEO has recently given a small interview for the Safety Detectives blog covering our service focus and how we

Our client Open Social gains ISO 27001 certification

Our client Open Social gains ISO 27001 certification

We are happy to report that our client, a community platform Open Social, has recently gained ISO 27001 certification. Over

ISO 27001: Implementation guide for IT Companies

ISO 27001: Implementation guide for IT Companies

In this post, we present a comprehensive guide on ISO 27001 implementation for companies: key steps/resources to establish an efficient ISMS and practical tips from our experts

CVE-2021-21327: Remotely trigerring execution of your PHP objects in GLPI

CVE-2021-21327: Remotely trigerring execution of your PHP objects in GLPI

Our team discovered a CVE in a popular open-source ITSM and Service Center software GLPI. The vulnerability allows to remotely trigger certain initialization code.

4 Tips to Maximize Application Pentest Value

4 Tips to Maximize Application Pentest Value

Some interesting insights on how to get the most of your pentest: from selecting the right vendor to proper project management.

Shift-Left Security: The Basics of Threat Modeling

Shift-Left Security: The Basics of Threat Modeling

Basics of the trendy shift-left security approach and specifically focusing on one extremely useful practise – threat modeling.

Launched our new website

Launched our new website

Just recently we’ve launched our new website and blog. Our insightful content plan for 2021 is ready so stay tuned!