Cybersecurity Blog

Keep up to speed with the latest security news, as well as updates to the Adversary security training platform.
Re-enact the Panama Papers Leak
Read more
Panama Papers Featured Blog
Clock6 Minute Read
6 New Missions Added to the Adversary Security Training Platform
We're constantly adding new content to Adversary so you can stay up to date on the latest vulnerabilities. Read on to learn all about our 6 exciting new missions.

We know how important it is to stay up to date on security issues and vulnerabilities. We also know that cybersecurity training needs to be continuous. That’s why we’re constantly adding new content to the Adversary training platform. We...

Clock9 Minute Read
How Hackers Exploited a Buffer Overflow Security Flaw to Hack WhatsApp
WhatsApp has been in the news lately following the discovery of a buffer overflow flaw. Read on to experience just how it happened and try out hacking one yourself.

WhatsApp entered the news early last week following the discovery of an alarming targeted security attack, according to the Financial Times. WhatsApp, famously acquired by Facebook for $19 billion in 2014, is the world’s most-popular...

Clock4 Minute Read
Security training at your own pace
The best strategy to counter cybercrime lies not in technological security solutions but rather well-trained individuals who understand security threats as well as their adversary’s mindset and can adapt to new attacks.

The challenge

Companies today face enormous cybersecurity challenges, losing hundreds of billions of euros collectively every year due to data breaches exploited by hackers. Cybersecurity is famously hard, and attackers are increasingly...

Clock5 Minute Read
Curious how Facebook got hacked? Try it out for yourself!
Here we’ll discuss and demonstrate Facebook’s latest data breach along with providing a realistic simulation which recreates the events that took place.

Like other security enthusiasts, we have been avidly following the latest Facebook attack where access tokens for 30 million users were stolen. Large-scale breaches from hacking naturally attract significant attention, despite them being...