Tag

security

An overview of all the new features of the Ostorlab platform and its detection capabilities.

Security

GodFather Android Malware Analysis

In This article, we analyze the GodFather Android malware, which continues to appear in various formats and primarily targets banking and cryptocurrency applications to steal money and sensitive information for the users.

Fri 14 April 2023

Product

Ostorlab Achieves SOC2 Type 2 Certification for Commitment to Security and Data Protection

Ostorlab has successfully completed its SOC2 Type 2 audit, demonstrating its commitment to security and data protection.

Wed 12 April 2023

Product

Ostorlab, top 10 vulnerability management innovators of 2023 by GRC Viewpoint

Ostorlab has been selected as one of the top 10 vulnerability management innovators of 2023 by GRC Viewpoint.

Mon 16 January 2023

2022 is a year that brings with it many global challenges, including war, economic uncertainty, and rising inflation in many parts of the world. Despite these challenges, we at Ostorlab are grateful to have had an incredibly successful year.

This article talks about how OXO works under the hood.

Latest posts

Attack Surface Insights - part 2

Attack Surface is not just about open ports and services; this article covers key insights beyond the standard technical ones.

Thu 16 June 2022

Mapping your Attack Surface - part 1

Attack surface mapping has become the number one headache of CISO's of most large organization, this article goes over techniques and tools used by Ostorlab to enable powerful and accurate attack surface discovery and monitoring.

Tue 17 May 2022

Ostorlab is Open-Source 🎊

This is a major release open-sourcing Ostorlab and announcing tons of new features and capabilities.

Mon 21 February 2022

Finding superhuman XSS polyglot payloads with Genetic Algorithms

The following article is a technical deep dive into how genetic algorithms can be leveraged to create superhuman XSS polyglot payloads.

Mon 01 March 2021

Autonomous Security: Pushing Security Automation to the Next Level

The article introduces the term Autonomous Security in the context of security scanning and defines 5 tiers of maturity.

Mon 26 October 2020

DOM XSS Fuzzing strategies - Part 1

XSS are still by far the most common tyope of vulnerabilities, this article presents strategies to automate the search for XSSes.

Sat 22 December 2018

Hardcoded AWS keys in Mobile Applications

This article is about how to manage AWS access keys when using AWS services in your mobile application.

Thu 20 December 2018


2 of 2
Next