Skip to content
23.1.2026

OWASP Top 10 2025 – What is new and what has actually changed

OWASP Top 10 2025 summarizes the most critical security risks in modern web applications and shows how the threat landscape has evolved since 2021.
10.12.2025

Cross-Site Scripting (XSS) Explained

Learn about Cross-Site Scripting (XSS), its types, impacts, and protection strategies to secure your web applications from this prevalent vulnerability.
9.5.2025

Active Directory Part 3: Kerberoasting Attack – What is it?

Active Directory is central to modern enterprise networks, but its complexity also makes it a prime target for attackers. One such attack is Kerberoasting.
29.8.2024

Active Directory Part 2: Domain Trust

In this blog series, we will embark on a journey through the intricate landscape of Active Directory, shedding light on the most prevalent pitfalls and vulnerabilities that organizations face.
26.6.2024

A Tsunami of European cybersecurity regulation – are you ready to surf?

This blog post highlights how EU initiatives and regulatory packages may affect your business and how you can strategically adapt to these changes.
10.1.2024

Breaking Bugs: The Delicate Dance of Vulnerability Disclosure

Dive into the delicate dance of vulnerability disclosure, exploring private, full, and coordinated reporting for a more secure digital future.
8.1.2024

Active Directory Part 1: PowerShell

Learn about the power and vulnerabilities of PowerShell in Active Directory security. Discover how PowerShell can be used in reconnaissance and enumeration
31.10.2023

Get on track with AI – a summary of four seminal books

Explore key insights from four pivotal AI books: 'Life 3.0', 'Superintelligence', 'Human Compatible', and 'Robot Rules'. Dive into AI's future and ethics.
21.9.2023

Active Directory: Introduction

Learn how to secure your Active Directory environment in this blog series! Explore common pitfalls, vulnerabilities, and of course mitigation strategies.