We use cookies to ensure our website works properly and to enhance your experience. By continuing to visit this site, you agree to our use of cookies for traffic analysis, personalized advertising, and more. For more details, see our Cookie Notice.
Blog
Stay updated with the latest offensive security news, knowledge, and resources.
What if you could predict which vulnerabilities threat actors will weaponize months before CISA adds them to their Known Exploited Vulnerabilities list? Andrew Grealy, Head of Armis Labs, has built exactly that capability, providing organizations with threat intelligence that arrives 3-12 months ahead of traditional indicators.
Explore common pitfalls in Java and C# reflection practices—understand how insecure use of reflection can expose applications to vulnerabilities like code injection, unauthorized access, and bypassed security controls, and learn key strategies to harden your code.