Adversary

Security Blog

Adversary Expands Further into the Scandinavian Market by Partnering with Outpost24

Clock2 Minute Read
Reykjavik, Iceland – June 25th, 2019 - Adversary, developers of a hands-on security training platform for development teams today announced a new partnership with Outpost24, innovator in identifying and managing cyber security exposures. The partnership will support Adversary to more aggressively target the Nordic marking while complementing Outpost24’s application security testing solutions to reduce the attack surface across the SDLC by identifying and remediating vulnerabilities before they put organizations at risk.
Read More

6 New Missions Added to the Adversary Security Training Platform

Clock6 Minute Read
We're constantly adding new content to Adversary so you can stay up to date on the latest vulnerabilities. Read on to learn all about our 6 exciting new missions. We know how important it is to stay up to date on security issues and vulnerabilities. We also know that cybersecurity training needs to be continuous. That’s why we’re constantly adding new content to the Adversary training platform. We recently added 6 new missions which address the OWASP Top 10 in new and different ways. The types of issues include:
Read More

How Hackers Exploited a Buffer Overflow Security Flaw to Hack WhatsApp

Clock9 Minute Read
WhatsApp has been in the news lately following the discovery of a buffer overflow flaw. Read on to experience just how it happened and try out hacking one yourself. WhatsApp entered the news early last week following the discovery of an alarming targeted security attack, according to the Financial Times. WhatsApp, famously acquired by Facebook for $19 billion in 2014, is the world’s most-popular messaging app with 1.5 billion monthly users from 180 countries and has always prided itself on being secure. Below, we’ll explain what went wrong technically, and teach you how you could hack a similar memory corruption vulnerability. Try out the hack
Read More

Adversary Competes in Black Unicorn Awards for 2019

Clock1 Minute Read
Adversary Nominated in Most Prestigious Awards for Cybersecurity Companies Who Have the Potential of Being Valued at $1B REYKJAVIK MAY 6, 2019 – Adversary, the cybersecurity industry’s leading provider of security training for developers today announced that is has been nominated for a Black Unicorn Award for 2019.
Read More

Security training at your own pace

Clock4 Minute Read
The best strategy to counter cybercrime lies not in technological security solutions but rather well-trained individuals who understand security threats as well as their adversary’s mindset and can adapt to new attacks. The challenge Companies today face enormous cybersecurity challenges, losing hundreds of billions of euros collectively every year due to data breaches exploited by hackers. Cybersecurity is famously hard, and attackers are increasingly adaptive at circumventing our cyberdefences. Cyberattacks have caused significant damage for individuals and companies. The exponential growth of cybercrime worldwide has been a stark, consistent and alarming trend as can be seen clearly from this infographic.
Read More

Curious how Facebook got hacked? Try it out for yourself!

Clock5 Minute Read
Here we’ll discuss and demonstrate Facebook’s latest data breach along with providing a realistic simulation which recreates the events that took place. Like other security enthusiasts, we have been avidly following the latest Facebook attack where access tokens for 30 million users were stolen. Large-scale breaches from hacking naturally attract significant attention, despite them being depressingly common. Aside from all the political and economic questions that are prompted when a data breach has the spotlight, the technical aspects are of central interest to security enthusiasts: what mistakes were made and cleverly exploited to successfully hack the organization? Here we explore and explain the known technical details of the hack that were promptly released by Facebook. We remark that detailed disclosures of this type demonstrate maturity and can be part of a strong cybersecurity strategy: the more companies share about their challenges and mistakes for others to avoid, the greater the payoff to everyone’s security through the proverbial golden rule.
Read More