As part of our continuous growth and commitment to excellence, we have moved to a brand-new office space!
In this second chapter of our three-part series we will look further into the mind of an application pentester to find out about challenges.
In the first chapter of a three-part series we will delve into the mind of an application pentester.
Rethinking “Zero Trust” in Cybersecurity: Why Trust Still Matters In the realm of cybersecurity, the term “Zero Trust” has gained considerable traction in recent years. It suggests a paradigm...
What OT security is all about OT security this, OT security that… a lot of technology vendors are hitting this nail and promising all sorts of things. But they...
What do data diodes and “Zone 30” have in common? What is a data diode? A data diode, also sometimes called one-way or unidirectional technology, is a powerful security...
This NIS2 Directive: what is that? Is that something for me? I receive a lot of questions from customers and prospects about the NIS2 Directive. That’s why I decided...
How Spinae Was Able To Take Over Thousands Of Websites Dear security enthusiasts, In this article we will discus how Spinae was able to identify and exploit an...
Vulnerability found in Virtual Reception Kiosk We are proud to announce that the vulnerability CVE-2023-25289, discovered by security researchers from Spinae, has been recognized. Virtual Reception Kiosk During a Pentest...
Are Passwords a Thing of the Future? Or a Thing of the Past? Passwords have been used for a very long time. Nowadays we use them in our digital...