Insights & Research

Security
intelligence

Analysis, trends, and research from our security team. What we're seeing in the field, what's changing in the threat landscape, and what it means for your organization.

Featured Analysis

The Real Cost of "Good Enough" Security: Why Automated Scanners Miss What Matters

Our analysis of 15+ assessments shows that automated scanners consistently miss the vulnerabilities that cause the most damage. Business logic flaws, authentication bypasses, and authorization failures account for 73% of critical findings — and 0% of scanner detections.

April 2026 Research
Latest

Recent insights

Compliance

Swiss nDSG: What Changed and What It Means for Your Business

The new Swiss Federal Act on Data Protection (nDSG) brought personal criminal liability of up to CHF 250,000 for responsible individuals.

The revised nDSG, effective September 2023, fundamentally changed the accountability model. Key changes include: personal criminal fines up to CHF 250,000 (not the company — the individual), mandatory breach notification within 72 hours, data protection impact assessments for high-risk processing, and strengthened requirements for cross-border data transfers. Board members and CTOs who fail to implement adequate technical and organizational measures face personal liability. We recommend: a data mapping exercise, a gap analysis against nDSG requirements, and a security assessment of all systems processing personal data.

March 2026 Read more ↓
Vulnerabilities

Race Conditions in Live Betting: The Six-Figure Bug Class Nobody Tests

Race conditions in financial transaction processing have caused six-figure losses in single weekends.

When a user places a bet, the system must: check balance, validate odds, create the bet, and deduct the balance — atomically. If these steps aren't properly serialized, an attacker can send 50 concurrent requests in a 100ms window, each passing the balance check before any deduction occurs. Result: 50 bets placed with funds for 1. We've seen this pattern across live betting, payment gateways, and bonus redemption flows. Automated scanners cannot detect race conditions — they require manual testing with precision timing tools. Our approach: we identify all state-changing endpoints, map the transaction flow, and test with concurrent requests at varying timing windows.

March 2026 Read more ↓
Trends

AI-Powered Attacks Are Here: What Defenders Need to Know in 2026

From automated phishing to LLM-assisted vulnerability discovery, AI is changing the attacker toolkit.

What's real: AI-generated phishing emails that pass human detection, automated reconnaissance at scale, and LLM-assisted code analysis for vulnerability discovery. What's hype: fully autonomous hacking agents (still unreliable), AI-generated zero-days (requires human expertise to weaponize). What to prepare for: improved social engineering attacks, faster exploitation of known vulnerabilities, and AI-powered credential stuffing with context-aware password guessing. Our recommendation: focus on fundamentals — patch management, strong authentication, input validation, and security awareness training that accounts for AI-generated content.

February 2026 Read more ↓
Compliance

Gambling Regulation Security: MGA, UKGC, and BGS Requirements Compared

A comparison of security testing requirements across Europe's three major gambling regulators.

MGA (Malta): requires annual penetration testing, RNG certification, and data protection audits. The most prescriptive framework. UKGC (UK): requires operators to demonstrate "appropriate security measures" but provides less specific technical guidance. Focuses on customer fund protection and fair gaming. BGS (Switzerland): newer framework with strong data protection requirements aligned with nDSG. Requires operators to demonstrate security testing but allows flexibility in methodology. Common gaps across all three: race condition testing in live betting, payment webhook validation, and KYC/AML bypass testing. Most operators meet minimum compliance but miss the business-logic vulnerabilities that cause actual financial losses.

February 2026 Read more ↓
Vulnerabilities

IDOR Is Still the #1 API Vulnerability — Here's Why

Insecure Direct Object References remain the most common critical finding in our assessments.

IDOR occurs when an API uses user-supplied identifiers (IDs, filenames, keys) to access objects without verifying that the requesting user is authorized to access that specific object. Example: GET /api/users/1234/invoices — change 1234 to 1235 and see another user's invoices. Why it persists: frameworks don't enforce object-level authorization by default, developers focus on authentication (who are you?) but forget authorization (can you access THIS?), and automated scanners can't detect it without understanding business context. Prevention: implement object-level authorization checks on every endpoint, use UUIDs instead of sequential IDs, and include IDOR testing in every security assessment.

January 2026 Read more ↓
Research

Supply Chain Security: When Your Dependencies Become Your Vulnerabilities

Third-party libraries, APIs, and SaaS integrations create an attack surface most organizations don't monitor.

The average web application depends on 200+ third-party packages. Each is a potential entry point. Our supply chain assessment methodology: inventory all dependencies (direct and transitive), check for known CVEs, verify package integrity (signatures, checksums), test third-party API integrations for data leakage, assess SaaS provider security posture, and map the blast radius of a compromised dependency. Recent incidents: the XZ Utils backdoor demonstrated that even critical infrastructure libraries can be compromised through social engineering of maintainers. We recommend: dependency pinning, automated vulnerability scanning in CI/CD, and regular third-party security reviews.

January 2026 Read more ↓
✉ Newsletter

Security intelligence, delivered

Vulnerability trends, regulatory updates, and research from our team — when it matters. No spam, no fluff. Select "Newsletter / Security Insights" on our contact form.

Subscribe →

Reading about vulnerabilities
is one thing. Finding yours is another.

Start with a free assessment. We'll show you what's actually at risk.

Get Your Free Assessment →