<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ostorlab: Mobile App Security Testing for Android and iOS</title><link>https://blog.ostorlab.co/</link><description>Ostorlab is a powerful mobile app security testing platform that conducts thorough static and dynamic security testing of Android and iOS applications.</description><atom:link href="https://blog.ostorlab.co/feed/rss.xml" rel="self"/><lastBuildDate>Thu, 16 Apr 2026 16:00:00 +0200</lastBuildDate><item><title>The Complete Guide to Healthcare Application Security Testing: Protecting ePHI, Medical Apps, and Patient Trust</title><link>https://blog.ostorlab.co/healthcare-application-security-testing-guide.html</link><description>&lt;p&gt;This comprehensive guide explores the critical role of application security testing in modern healthcare. It covers the shift toward application-driven care, the unique value of ePHI, and the regulatory landscape (HIPAA/GDPR). The article outlines a robust strategy for securing the healthcare ecosystem, including patient portals, APIs, and SaMD, while highlighting how autonomous tools like Ostorlab’s Deep Agentic Scan are defining the future of continuous, scalable security validation.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kawtar Boumaan</dc:creator><pubDate>Thu, 16 Apr 2026 16:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-04-16:/healthcare-application-security-testing-guide.html</guid><category>Security</category><category>Healthcare Cybersecurity</category><category>Application Security Testing</category><category>HIPAA Compliance</category></item><item><title>Mobile Banking Security Testing: Protecting Financial Apps, Data, and Transactions</title><link>https://blog.ostorlab.co/mobile-banking-security-testing.html</link><description>&lt;p&gt;Protecting mobile banking apps requires more than securing the client alone. This guide explores the risks across devices, networks, and backend systems, and explains why continuous mobile security testing is essential for protecting financial data and transactions.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Abir Jelti</dc:creator><pubDate>Thu, 16 Apr 2026 09:59:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-04-16:/mobile-banking-security-testing.html</guid><category>Security</category><category>Mobile</category><category>Testing</category><category>Banking</category><category>Security</category><category>Compliance</category></item><item><title>Twenty CRM Serverless Functions Expose Critical RCE and Permanent Unauthenticated Backdoor Risk (CVE-2026-26720) - PoC &amp; Exploit</title><link>https://blog.ostorlab.co/cve-2026-26720-twenty-crm-serverless-rce.html</link><description>&lt;p&gt;A technical breakdown of CVE-2026-26720, a CVSS 9.8 Critical authenticated Remote Code Execution vulnerability in Twenty CRM (≤ v1.15.0). Any workspace member can create and execute serverless functions that run unsandboxed with full access to process.env, leaking APP_SECRET, PG_DATABASE_URL, and all server-side credentials. When combined with webhook-triggered workflows exposed via PublicEndpointGuard, a single authenticated attacker can install a permanent unauthenticated RCE backdoor accessible from anywhere on the internet.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mohammed Lachhab</dc:creator><pubDate>Wed, 15 Apr 2026 09:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-04-15:/cve-2026-26720-twenty-crm-serverless-rce.html</guid><category>Security</category><category>Security</category><category>CVE</category><category>TypeScript</category><category>NestJS</category><category>RCE</category><category>vulnerability</category><category>cve-news</category></item><item><title>DORA Third‑Party Risk for Mobile AppSec: SDK Governance and Audit‑Ready Evidence Packs</title><link>https://blog.ostorlab.co/dora-3rd-party-risk-mobile-appsec.html</link><description>&lt;p&gt;A deep dive into DORA-focused third‑party risk for mobile AppSec, showing why embedded SDKs and runtime providers demand release‑scoped governance because vulnerabilities persist across multiple app versions in the wild and provider outages directly break critical journeys. It outlines an audit‑ready approach built on per‑release SDK inventories and diffs, approval/ban rules, patch SLAs with time‑boxed exceptions, and evidence packs that stay version‑scoped, indexed, and quickly retrievable.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bilal Harras</dc:creator><pubDate>Tue, 14 Apr 2026 18:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-04-14:/dora-3rd-party-risk-mobile-appsec.html</guid><category>Security</category><category>DORA</category><category>Compliance</category><category>Mobile Security</category></item><item><title>Mobile Application Shielding: What it is and How it works</title><link>https://blog.ostorlab.co/mobile-application-shielding-threat-models-and-best-practices.html</link><description>&lt;p&gt;Mobile application shielding protects apps on untrusted devices by preventing reverse engineering, tampering, debugging, and unauthorized access to sensitive data. It helps security teams secure critical app logic, sensitive information, and transactions even if the device is compromised.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Youssef Mabrouk</dc:creator><pubDate>Mon, 13 Apr 2026 12:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-04-13:/mobile-application-shielding-threat-models-and-best-practices.html</guid><category>Security</category><category>application-shielding</category></item><item><title>New Roundcube Webmail Vulnerabilities Disclosed : IMAP Command Injection and SSRF via CSS Proxying.</title><link>https://blog.ostorlab.co/roundcube-imap-injection-ssrf-ove-2026.html</link><description>&lt;p&gt;A deep dive into two critical vulnerabilities uncovered in Roundcube Webmail (&amp;lt; 1.6.14, 1.5.14, 1.7 RC4) during a source code review. OVE-2026-8 allows authenticated attackers to inject arbitrary IMAP commands via the _filter parameter due to missing CRLF sanitization. OVE-2026-9 enables Server-Side Request Forgery (SSRF) by exploiting the CSS proxying mechanism, allowing access to internal network resources and cloud metadata.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aziz Elbelaychy</dc:creator><pubDate>Wed, 08 Apr 2026 18:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-04-08:/roundcube-imap-injection-ssrf-ove-2026.html</guid><category>Security</category><category>Security</category><category>OVE</category><category>CRLF</category><category>SSRF</category><category>Roundcube</category><category>Vulnerability</category><category>cve-news</category></item><item><title>Announcing Ostorlab for Harness: Mobile Security Scanning in CI Pipelines</title><link>https://blog.ostorlab.co/ostorlab-harness-integration.html</link><description>&lt;p&gt;Ostorlab now integrates with Harness CI to run automated mobile application security scans inside CI pipelines. Using Harness Secrets and a simple Run step, teams can install the Ostorlab CLI and run ostorlab ci-scan run against the same build artifacts produced by the pipeline (e.g., Android APK, Android AAB, or iOS IPA). The integration helps bring security into CI by improving feedback speed and catching vulnerabilities earlier, with options to tailor scans via profiles (fast, full) and optional inputs like test credentials, SBOM, and UI prompts.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Abir Jelti</dc:creator><pubDate>Mon, 06 Apr 2026 16:51:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-04-06:/ostorlab-harness-integration.html</guid><category>Product</category><category>Mobile Security</category><category>CI/CD</category><category>DevSecOps</category><category>Harness</category><category>Ostorlab</category><category>AppSec</category><category>Security Automation</category><category>CI Scanning</category></item><item><title>CVE-2026-27971 : Qwik server$ Unauthenticated Remote Code Execution</title><link>https://blog.ostorlab.co/cve-2026-27971-rce-qwik.html</link><description>&lt;p&gt;A technical breakdown of CVE-2026-27971, a CVSS 9.2 critical unauthenticated remote code execution vulnerability in Qwik (&amp;lt; 1.19.1). Unsafe deserialization in the server$ RPC flow allows attacker-controlled QRL objects to be reconstructed from application/qwik-json requests, enabling arbitrary module path and symbol resolution and, where require() is available,remote code execution via crafted server-side function invocation.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aziz Elbelaychy</dc:creator><pubDate>Wed, 01 Apr 2026 14:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-04-01:/cve-2026-27971-rce-qwik.html</guid><category>Security</category><category>Security</category><category>CVE</category><category>RCE</category><category>vulnerability</category><category>cve-news</category></item><item><title>How to Automate Security Testing Behind Login Walls (2FA &amp; MFA)</title><link>https://blog.ostorlab.co/how-to-automate-security-testing-behind-login-walls.html</link><description>&lt;p&gt;Modern applications are more secure than ever, but that security introduces a major challenge. With the widespread adoption of Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA), automated security testing often stops at the login stage. As a result, automated testing often fails to reach the parts of the application where real user activity and risk exist.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Abir Jelti</dc:creator><pubDate>Mon, 30 Mar 2026 16:44:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2026-03-30:/how-to-automate-security-testing-behind-login-walls.html</guid><category>Product</category><category>2FA</category><category>MFA</category></item><item><title>Announcing Ostorlab for Bitrise: Mobile security scans in your CI</title><link>https://blog.ostorlab.co/ostorlab-bitrise-integration.html</link><description>&lt;p&gt;Ostorlab now integrates with Bitrise to run automated mobile application security scans inside CI workflows. Using a Bitrise Secret plus a simple Script step, teams can install the Ostorlab CLI and run ostorlab ci-scan run against the same build artifacts produced by the pipeline (e.g., Android APK, Android AAB, or iOS IPA). The integration helps shift security left by shortening feedback loops and catching vulnerabilities earlier, with options to tailor scans via profiles (fast, full, agentic deep scan) and optional inputs like test credentials, SBOM, and UI prompts.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bilal Harras</dc:creator><pubDate>Fri, 27 Mar 2026 14:44:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-27:/ostorlab-bitrise-integration.html</guid><category>Product</category><category>Mobile Security</category><category>CI/CD</category><category>DevSecOps</category><category>Bitrise</category><category>Ostorlab</category><category>AppSec</category><category>Security Automation</category><category>CI Scanning</category></item><item><title>Deep Agentic Scan (BYOK), New CI Integrations, Scan Filters &amp; Performance</title><link>https://blog.ostorlab.co/changelog-2026-03-march.html</link><description>&lt;p&gt;This release highlights Agentic Deep Scan with BYOK (Bring Your Own AI Key), adds Harness + Bitrise CI documentation, introduces scan filtering by tags and owners, and delivers major performance improvements across tickets and scans.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Fri, 27 Mar 2026 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-27:/changelog-2026-03-march.html</guid><category>Product</category><category>agentic-deep-scan</category><category>byok</category><category>integrations</category></item><item><title>CVE-2026-2599 : Unauthenticated PHP Object Injection → WP_HTML_Token POP Chain</title><link>https://blog.ostorlab.co/cve-2026-2599-php-object-injection-wp-html-token.html</link><description>&lt;p&gt;A technical breakdown of CVE-2026-2599, a CVSS 9.8 Critical unauthenticated PHP Object Injection vulnerability in the "Contact Form Entries" WordPress plugin (≤ 1.4.7). The download_csv function deserializes untrusted user input without allowed_classes restrictions. When combined with WordPress 6.4.0-6.4.1, the built-in WP_HTML_Token class provides a complete all-public POP chain leading to full Remote Code Execution via two unauthenticated HTTP requests.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mohammed Lachhab</dc:creator><pubDate>Wed, 25 Mar 2026 14:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-25:/cve-2026-2599-php-object-injection-wp-html-token.html</guid><category>Security</category><category>Security</category><category>CVE</category><category>PHP</category><category>WordPress</category><category>RCE</category><category>vulnerability</category><category>cve-news</category></item><item><title>Mobile Operational Resilience Under DORA: The simplest drill library for BFSI journeys</title><link>https://blog.ostorlab.co/dora-mobile-resilience-drills.html</link><description>&lt;p&gt;A mobile-first guide to DORA compliance for BFSI teams. Learn how to define your scope, simplify your release process, and avoid the traps that create unnecessary compliance work.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bilal Harras</dc:creator><pubDate>Tue, 24 Mar 2026 14:44:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-24:/dora-mobile-resilience-drills.html</guid><category>Security</category><category>DORA</category><category>Compliance</category><category>Mobile Security</category></item><item><title>Ostorlab Launches Agentic Deep Scan: The next-generation vulnerability scanner</title><link>https://blog.ostorlab.co/ostorlab-launches-agentic-deep-scan.html</link><description>&lt;p&gt;Ostorlab has launched Agentic Deep Scan, a next-generation vulnerability scanner that validates real-world risks in iOS, Android (soon harmonyOS), and web applications. With Bring Your Own Key (BYOK) support, teams can safely explore its powerful scanning capabilities while keeping full control of their data and costs.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Thu, 19 Mar 2026 11:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-19:/ostorlab-launches-agentic-deep-scan.html</guid><category>Product</category><category>Agentic Deep Scan</category></item><item><title>Exploit CVE-2025-68461 : Roundcube Webmail SVG Animate XSS Sanitizer Bypass</title><link>https://blog.ostorlab.co/cve-2025-68461-xss-roundcube.html</link><description>&lt;p&gt;A technical breakdown of CVE-2025-68461, a CVSS 7.2 high stored Cross-Site Scripting vulnerability in Roundcube Webmail (&amp;lt; 1.5.12 and &amp;lt; 1.6.12). The rcube_washtml sanitizer blocks SVG \&lt;animate&gt; tags that target the href attribute, but the attribute_value() comparison does not strip XML namespace prefixes before matching. An attacker can use attributeName="xlink:href" to bypass the check entirely, delivering unsanitized javascript: URIs in the values attribute directly into the rendered email DOM. JavaScript execution is currently prevented by an accidental namespace corruption in PHP's DOMDocument::loadHTML() which strips the xlink namespace declaration, but the sanitizer bypass is confirmed and the vulnerability remains exploitable under alternative parser configurations such as the Masterminds HTML5 parser or PHP 8.4's Dom\HTMLDocument.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aziz Elbelaychy</dc:creator><pubDate>Tue, 17 Mar 2026 14:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-17:/cve-2025-68461-xss-roundcube.html</guid><category>Security</category><category>Security</category><category>CVE</category><category>XSS</category><category>Roundcube</category><category>vulnerability</category><category>cve-news</category></item><item><title>GHSA-cr3w-cw5w-h3fj: 1-Click RCE in Saltcorn</title><link>https://blog.ostorlab.co/ghsa-cr3w-cw5w-h3fj-1click-rce-saltcorn.html</link><description>&lt;p&gt;Analysis of GHSA-cr3w-cw5w-h3fj, a CVSS 9.7 critical XSS-to-RCE vulnerability in Saltcorn (≤ 1.5.0-beta.19). Two chained flaws, reflected XSS in route parameters and command injection in backup generation, enable remote code execution via administrator phishing.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mohammed Lachhab</dc:creator><pubDate>Wed, 11 Mar 2026 13:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-11:/ghsa-cr3w-cw5w-h3fj-1click-rce-saltcorn.html</guid><category>Security</category><category>security</category><category>saltcorn</category><category>RCE</category><category>XSS</category><category>vulnerability</category><category>GHSA</category><category>cve-news</category></item><item><title>DORA Compliance for Mobile Releases: The easiest baseline, verdict, and exceptions model</title><link>https://blog.ostorlab.co/dora-compliance-for-mobile-releases.html</link><description>&lt;p&gt;A mobile-first guide to DORA regulation and DORA compliance for BFSI teams. Learn how to define your scope, simplify your release process, and avoid the traps that create unnecessary compliance work.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bilal Harras</dc:creator><pubDate>Tue, 10 Mar 2026 14:44:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-10:/dora-compliance-for-mobile-releases.html</guid><category>Security</category><category>DORA</category><category>Compliance</category><category>Mobile Security</category></item><item><title>CVE-2026-26019 : LangChain RecursiveUrlLoader Server-Side Request Forgery Vulnerability</title><link>https://blog.ostorlab.co/cve-2026-26019-ssrf-langchain.html</link><description>&lt;p&gt;A technical breakdown of CVE-2026-26019, a CVSS 4.1 medium Server-Side Request Forgery vulnerability in the LangChain Community JavaScript package (&amp;lt; 1.1.14). The RecursiveUrlLoader class uses a naive string prefix check to validate crawled URLs, allowing an attacker to bypass the default preventOutside restriction with a suffixed domain and redirect the crawler to internal network assets, potentially exposing sensitive credentials and metadata endpoints.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aziz Elbelaychy</dc:creator><pubDate>Wed, 04 Mar 2026 14:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-04:/cve-2026-26019-ssrf-langchain.html</guid><category>Security</category><category>Security</category><category>CVE</category><category>SSRF</category><category>cve-news</category><category>vulnerability</category></item><item><title>DORA Compliance for Mobile Teams: Understanding scope and what you need to do</title><link>https://blog.ostorlab.co/understanding-dora-compliance-for-mobile-teams.html</link><description>&lt;p&gt;A mobile-first guide to DORA regulation and DORA compliance for BFSI teams. Learn how to define your scope, simplify your release process, and avoid the traps that create unnecessary compliance work.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bilal Harras</dc:creator><pubDate>Tue, 03 Mar 2026 11:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-03-03:/understanding-dora-compliance-for-mobile-teams.html</guid><category>Security</category><category>DORA</category><category>Compliance</category><category>Mobile Security</category></item><item><title>Top 10 Mobile Pentesting Tools in 2026</title><link>https://blog.ostorlab.co/top-10-mobile-pentesting-tools-in-2026.html</link><description>&lt;p&gt;We work with mobile apps every day, and over time we’ve found a list of open-source tools that consistently make our testing more powerful, faster and fun. In this article, we’ve highlighted &lt;strong&gt;10 mobile app pentesting tools&lt;/strong&gt; we love using everyday.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Youssef Mabrouk</dc:creator><pubDate>Fri, 27 Feb 2026 16:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-02-27:/top-10-mobile-pentesting-tools-in-2026.html</guid><category>Security</category><category>Mobile-pentest</category><category>pentetration-testing</category></item><item><title>CVE-2025-64712: Path Traversal RCE in Unstructured Library MSG Processing</title><link>https://blog.ostorlab.co/cve-2025-64712-path_traversal-rce-unstructured.html</link><description>&lt;p&gt;A technical breakdown of CVE-2025-64712, a CVSS 9.8 critical path traversal remote code execution vulnerability in the Unstructured Python library (&amp;lt; 0.18.18). Unsanitized attachment filenames in Outlook MSG processing allow for path traversal, enabling an attacker to overwrite arbitrary files via a crafted MSG file and achieve code execution.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aziz Elbelaychy</dc:creator><pubDate>Mon, 23 Feb 2026 08:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-02-23:/cve-2025-64712-path_traversal-rce-unstructured.html</guid><category>Security</category><category>security</category><category>CVE</category><category>Path Traversal</category><category>RCE</category><category>vulnerability</category><category>cve-news</category></item><item><title>CVE-2026-1357: Unauthenticated RCE in WPvivid Backup Plugin</title><link>https://blog.ostorlab.co/cve-2026-1357-unauthenticated-rce-wpvivid.html</link><description>&lt;p&gt;A technical breakdown of CVE-2026-1357, a CVSS 9.8 critical unauthenticated remote code execution vulnerability in the WPvivid Backup &amp;amp; Migration plugin (≤ 0.9.123). Two chained flaws, a cryptographic fail-open and an unsanitized path traversal, allow arbitrary file write and shell upload without credentials.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mohammed Lachhab</dc:creator><pubDate>Fri, 20 Feb 2026 08:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-02-20:/cve-2026-1357-unauthenticated-rce-wpvivid.html</guid><category>Security</category><category>security</category><category>CVE</category><category>wordpress</category><category>RCE</category><category>vulnerability</category><category>cve-news</category></item><item><title>8 Open-Source AI Pentest Tools for Security Teams in 2026</title><link>https://blog.ostorlab.co/8-open-source-ai-pentest-tools-2026.html</link><description>&lt;p&gt;This article lists eight (8) open-source AI pentest tools. It covers how autonomous agents are potentially changing the way security testing is done.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Youssef Mabrouk</dc:creator><pubDate>Fri, 30 Jan 2026 08:20:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-01-30:/8-open-source-ai-pentest-tools-2026.html</guid><category>Security</category><category>security</category><category>open-source</category><category>AI</category><category>pentesting</category></item><item><title>Ostorlab 2025 Year in Review</title><link>https://blog.ostorlab.co/ostorlab-2025-year-in-review.html</link><description>&lt;p&gt;2025 marked the turning point where AI in cybersecurity graduated from experimental prototypes to production-grade engines. In this retrospective, we explore how Ostorlab’s new AI Pentest Engine and AI Monkey Tester are already uncovering critical vulnerabilities in the wild, including a complex arbitrary file read chain in Signal for Android. From mapping global banking risks to orchestrating scans with OXO Titan, dive into the year we redefined what automated security testing can actually do.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Manal Samir</dc:creator><pubDate>Wed, 28 Jan 2026 16:20:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-01-28:/ostorlab-2025-year-in-review.html</guid><category>Product</category><category>Ostorlab</category></item><item><title>Android Requires Developer Verification Starting from 2026</title><link>https://blog.ostorlab.co/android-requires-developer-verification-starting-from-2026.html</link><description>&lt;p&gt;For years, &lt;strong&gt;Android’s openness&lt;/strong&gt; was one of its biggest &lt;strong&gt;strengths&lt;/strong&gt;. Anyone could build an app, share it, and sideload it freely. Users were &lt;strong&gt;warned&lt;/strong&gt; about the risks, but the &lt;strong&gt;choice was always theirs&lt;/strong&gt;. Starting in &lt;strong&gt;2026&lt;/strong&gt;, Android will &lt;strong&gt;require developer verification&lt;/strong&gt; for apps to run on certified devices. Apps from unverified developers can be &lt;strong&gt;blocked&lt;/strong&gt;, even when users knowingly install them. Google calls it security. Critics call it a loss of freedom. Understanding what’s changing and where Android draws the line now matters more than ever.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Youssef Mabrouk</dc:creator><pubDate>Tue, 27 Jan 2026 10:47:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-01-27:/android-requires-developer-verification-starting-from-2026.html</guid><category>Security</category><category>security</category><category>android</category><category>developer-verification</category><category>sideloading</category></item><item><title>That Time a Zero (could have) Broke the Internet's Plumbing (CVE-2026-0915)</title><link>https://blog.ostorlab.co/glibc-dns-zero-input-cve-2026-0915.html</link><description>&lt;p&gt;An AI-assisted analysis uncovered a 30-year-old uninitialized buffer vulnerability in glibc's _nss_dns_getnetbyaddr_r function. This case study details how a zero-input edge case bypasses loop logic, causing the library to transmit raw stack memory to external DNS servers, and benchmarks how various AI models succeeded in identifying this subtle logic error where human review failed.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Wed, 21 Jan 2026 16:20:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-01-21:/glibc-dns-zero-input-cve-2026-0915.html</guid><category>Security</category><category>linux</category><category>glibc</category><category>memory-safety</category><category>cve-2026-0915</category><category>ai-pentest</category><category>dns</category></item><item><title>Javascript Interface Exposure</title><link>https://blog.ostorlab.co/ai-pentest-android-webview-bridge-exposure.html</link><description>&lt;p&gt;Ostorlab's Pentest Engine identified a JavaScript bridge exposure in an Android WebView, allowing unauthenticated native method invocation via deep links. This case study details how the engine bypassed insecure Intent handling to manipulate the native UI, validating a potent social engineering vector while confirming the effectiveness of the underlying sandbox.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mohamed Nasser</dc:creator><pubDate>Wed, 07 Jan 2026 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-01-07:/ai-pentest-android-webview-bridge-exposure.html</guid><category>Security</category><category>android</category><category>webview</category><category>javascript-bridge</category><category>ai-pentest</category><category>security</category><category>mobile</category><category>poc</category></item><item><title>Top Mobile App Security Testing Platforms 2026</title><link>https://blog.ostorlab.co/top-mobile-app-security-testing-platforms-2026.html</link><description>&lt;p&gt;Navigate the market for the Top Mobile App Security Testing Platforms 2026 by focusing on the criteria that actually matter for your delivery workflow. Our guide details exactly what to look for, including seamless CI/CD integration, powerful detection, and high-fidelity signal-to-noise ratios. Learn how to evaluate vendors on scalability, multiplatform support, and collaboration features to select a partner that secures your mobile releases without slowing you down.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bilal Harras</dc:creator><pubDate>Mon, 05 Jan 2026 16:20:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2026-01-05:/top-mobile-app-security-testing-platforms-2026.html</guid><category>Product</category><category>android</category><category>ios</category><category>security</category><category>mobile</category><category>top 10</category></item><item><title>Understanding Android's FLAG_SECURE for Screen Security</title><link>https://blog.ostorlab.co/understanding-android-flag-secure-screen-security.html</link><description>&lt;p&gt;What Android’s FLAG_SECURE does, how it prevents screenshots and screen recordings of sensitive app content, how to implement it correctly, where it makes sense to use it, and the key limitations and UX trade-offs developers need to understand, including its behavior with casting and external displays.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bilal Harras</dc:creator><pubDate>Mon, 29 Dec 2025 16:20:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-12-29:/understanding-android-flag-secure-screen-security.html</guid><category>Security</category><category>android</category><category>security</category><category>mobile</category></item><item><title>AI Pentest Engine Discovers Critical WebSocket BFLA in GraphQL Subscriptions</title><link>https://blog.ostorlab.co/ai-pentest-websocket-bfla-graphql.html</link><description>&lt;p&gt;Ostorlab's AI Pentest Engine systematically uncovered a critical Broken Function-Level Authorization (BFLA) vulnerability in a GraphQL WebSocket endpoint, allowing unauthenticated access to a real-time translation service. This case study details the AI's step-by-step process, from discovery to proof-of-concept.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Abderrahim Haddadi</dc:creator><pubDate>Fri, 26 Dec 2025 16:20:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-12-26:/ai-pentest-websocket-bfla-graphql.html</guid><category>Security</category><category>security</category><category>ai</category><category>poc</category><category>pentesting</category><category>websocket</category><category>graphql</category><category>bfla</category><category>authorization</category></item><item><title>AI Pentest Upgrades, ServiceNow Integration, Redesigned Email Notifications, and Enhanced Platform Controls</title><link>https://blog.ostorlab.co/changelog-2025-12-17-december.html</link><description>&lt;p&gt;This release delivers major advancements across the Ostorlab platform, including a significant upgrade to AI Pentest, enhanced web and mobile automation, a full-featured ServiceNow integration, redesigned email notifications, improved threat intelligence capabilities, and comprehensive access control enhancements with role and owner-based permissions.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Wed, 17 Dec 2025 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-12-17:/changelog-2025-12-17-december.html</guid><category>Product</category><category>AI Pentest</category><category>Threat Intelligence</category><category>Web Automation</category><category>Email Notifications</category><category>Platform UX</category><category>Mobile Security</category><category>ServiceNow</category><category>Integrations</category><category>RBAC</category><category>Access Control</category></item><item><title>AI Engine Triggers Account Takeover via API Version Confusion</title><link>https://blog.ostorlab.co/ai-engine-password-reset-version-confusion.html</link><description>&lt;p&gt;Methodical analysis beats blind fuzzing as Ostorlab's AI engine discovers cross-version password reset weakness and achieves account takeover without email access.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Amine Atyq</dc:creator><pubDate>Mon, 15 Dec 2025 10:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-12-15:/ai-engine-password-reset-version-confusion.html</guid><category>Security</category><category>security</category><category>AI</category><category>POC</category><category>pentesting</category><category>account takeover</category><category>API security</category></item><item><title>Uncovering a Second-Order Data Exfiltration Chain in Modern SPAs</title><link>https://blog.ostorlab.co/uncovering-second-order-data-exfiltration-chain-modern-spas.html</link><description>&lt;p&gt;How a second-order client-side data exfiltration chain was discovered in a modern SPA, transforming a simple open redirect into a multi-stage data theft vulnerability through JavaScript analysis and exploit chain validation.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mouad Ait Ougrram</dc:creator><pubDate>Wed, 10 Dec 2025 16:20:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-12-10:/uncovering-second-order-data-exfiltration-chain-modern-spas.html</guid><category>Security</category><category>security</category><category>automated-pentest</category><category>web</category><category>SPA</category><category>JavaScript</category><category>vulnerability</category></item><item><title>Ostorlab AI Pentest Engine: How it Works</title><link>https://blog.ostorlab.co/ostorlab-ai-engine-how-it-works.html</link><description>&lt;p&gt;Technical deep dive into Ostorlab AI Pentest Engine inner working, from threat intelligence, risk identification, mobile support to vulnerability validation.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 27 Oct 2025 16:20:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-10-27:/ostorlab-ai-engine-how-it-works.html</guid><category>Security</category><category>security</category><category>AI</category><category>pentest</category><category>android</category><category>ios</category><category>web</category></item><item><title>Going Beyond: Ostorlab AI Engine Discovers Unknown Vulnerability Classes</title><link>https://blog.ostorlab.co/going-beyond-ostorlab-ai-engine-discovers-unknown-vulnerability-classes.html</link><description>&lt;p&gt;Ostorlab’s reasoning-driven AI engine breaks past rule-based limits to surface previously unknown and hard-to-detect vulnerabilities—including WebView Safe Browsing bypasses, SQLi via projections, WebCrypto key exfiltration, and JWT verification ordering flaws—delivering deeper, smarter, complementary security coverage.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 13 Oct 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-10-13:/going-beyond-ostorlab-ai-engine-discovers-unknown-vulnerability-classes.html</guid><category>Security</category><category>security</category><category>AI</category><category>pentest</category><category>android</category><category>ios</category><category>web</category><category>api</category><category>JWT</category></item><item><title>Mobile Benchmarking, Monkey Tester Reliability, and Deeper Web Crawling</title><link>https://blog.ostorlab.co/changelog-2025-09-19-september.html</link><description>&lt;p&gt;This release introduces newly developed insecure mobile apps, improves the Monkey Tester for reliable prompt-based input during dynamic scans, and enhances the web crawler to explore deeper routes with faster performance. These improvements boost scanning coverage, accuracy, and reliability&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Tue, 23 Sep 2025 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-09-23:/changelog-2025-09-19-september.html</guid><category>Product</category><category>Mobile Benchmark</category><category>Monkey Tester</category><category>Web Crawler</category><category>Dynamic Scanning</category><category>Automation</category><category>CI/CD</category><category>performance</category></item><item><title>Introducing Ostorlab Security Testing Benchmarks: Real Vulnerabilities, Real Impact</title><link>https://blog.ostorlab.co/ostorlab-security-testing-benchmark-open-source.html</link><description>&lt;p&gt;The first open-source benchmark suite featuring 93 realistic vulnerable mobile apps that mirror actual CVE and bug bounty findings - not theoretical textbook examples.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 22 Sep 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-09-22:/ostorlab-security-testing-benchmark-open-source.html</guid><category>Security</category><category>security</category><category>benchmark</category><category>open-source</category><category>android</category><category>ios</category></item><item><title>Banking Report 2025: Security at the Core of Mobile Finance</title><link>https://blog.ostorlab.co/banking-report-2025.html</link><description>&lt;p&gt;Large-scale security analysis of 500+ top mobile banking apps reveals widespread vulnerabilities, decade-old codebases, and concerning backend centralization patterns.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 15 Sep 2025 10:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-09-15:/banking-report-2025.html</guid><category>Security</category><category>mobile banking</category><category>security</category><category>research</category></item><item><title>Automating Security Research: AI Engine Exploits Complex Blind Code Injection</title><link>https://blog.ostorlab.co/titiler-python-code-injection-ai-poc.html</link><description>&lt;p&gt;Precision beats payload spray using Ostorlab's AI engine to systematically land RCE on Titiler and proves exfiltration without a single stack trace.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Thu, 04 Sep 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-09-04:/titiler-python-code-injection-ai-poc.html</guid><category>Security</category><category>security</category><category>AI</category><category>POC</category><category>pentesting</category><category>python</category><category>code injection</category></item><item><title>AI-Powered Pentesting: A Deep Dive into Android Intent Redirection</title><link>https://blog.ostorlab.co/intent-redirection-ai-poc.html</link><description>&lt;p&gt;This article showcases Ostorlab's AI Pentest Engine's process for analyzing an Android application for Intent Redirection vulnerabilities. Follow the engine's journey from static analysis and initial findings to rigorous dynamic validation, demonstrating its ability to not only identify potential threats but also to meticulously discard false positives.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Sun, 31 Aug 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-08-31:/intent-redirection-ai-poc.html</guid><category>Security</category><category>security</category><category>android</category><category>intent redirection</category><category>AI</category><category>POC</category><category>pentesting</category></item><item><title>Automating Security Research: AI Engine Exploits GCP Service Account Secret</title><link>https://blog.ostorlab.co/gcp-secret-ai-poc.html</link><description>&lt;p&gt;This article presents a thorough, hands-on analysis and real-world exploitation of a hardcoded GCP service account with overprivileged Pub/Sub access discovered in a HackerOne mobile app. It details how Ostorlab’s AI-powered pentesting engine automated the full cycle—from authentication and permission enumeration to end-to-end message injection/interception—enabling remediation within four days.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Thu, 28 Aug 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-08-28:/gcp-secret-ai-poc.html</guid><category>Security</category><category>security</category><category>secret</category><category>GCP</category><category>AI</category><category>POC</category></item><item><title>From Signal to the Android SDK: Chaining Path Traversal, Mimetype Confusion, Security Check Bypass and File Descriptor Bruteforce for Arbitrary File Access</title><link>https://blog.ostorlab.co/signal-arbitrary-file-read.html</link><description>&lt;p&gt;This technical analysis reveals how sophisticated attack chains—combining path traversal, symbolic link manipulation, and Android SDK quirks—can breach Signal Android's defenses to extract sensitive internal files, despite its legendary encryption remaining intact. While Signal patched these vulnerabilities within days, the discoveries offer crucial lessons about how seemingly minor bugs can be chained into powerful exploits, and why even the best security architecture needs multiple layers of defense&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 11 Aug 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-08-11:/signal-arbitrary-file-read.html</guid><category>Security</category><category>security</category><category>signal</category><category>arbitrary file read</category></item><item><title>Automating Security Research: AI Engine Exploits Report Portal XXE (CVE-2021-29620)</title><link>https://blog.ostorlab.co/report-portal-xxe-cve-2021-29620-ai-poc.html</link><description>&lt;p&gt;This article presents a thorough, hands-on analysis and proof of concept for exploiting an OOB XXE vulnerability CVE-2021-29620 in Report Portal. It details how Ostorlab's AI-powered pentesting engine was used to automate the full cycle.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Thu, 07 Aug 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-08-07:/report-portal-xxe-cve-2021-29620-ai-poc.html</guid><category>Security</category><category>security</category><category>cve-2021-29620</category><category>reportportal</category><category>xxe</category><category>AI</category><category>POC</category></item><item><title>From Random to Intelligent: How AI-Powered Monkey Testing Achieves 10x Mobile App Coverage</title><link>https://blog.ostorlab.co/dast-ai-monkeytester-prompt-based.html</link><description>&lt;p&gt;Ostorlab’s AI Monkey Tester transforms mobile app security testing by using natural language prompts and generative AI to automatically generate intelligent, context-aware test scenarios, resulting in up to a 10x increase in application coverage compared to traditional, rule-based testing approaches.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Fri, 01 Aug 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-08-01:/dast-ai-monkeytester-prompt-based.html</guid><category>Product</category><category>MonkeyTester</category><category>AI</category><category>dynamic testing</category><category>DAST</category></item><item><title>Automating Security Research: AI Engine Exploits Zulip Stored XSS (CVE-2025-52559)</title><link>https://blog.ostorlab.co/zulip-stored-xss-cve-2025-52559-ai-poc.html</link><description>&lt;p&gt;This article presents a thorough, hands-on analysis and proof of concept for exploiting the stored XSS vulnerability CVE-2025-52559 in Zulip. It details how Ostorlab's AI-powered pentesting engine was used to automate the full cycle.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 28 Jul 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-07-28:/zulip-stored-xss-cve-2025-52559-ai-poc.html</guid><category>Security</category><category>security</category><category>cve-2025-52559</category><category>zulip</category><category>xss</category><category>AI</category><category>POC</category></item><item><title>SSL Scanner Overhaul and Improved UI Call Coverage Powered by User-Defined Prompts</title><link>https://blog.ostorlab.co/changelog-2025-07-23-july.html</link><description>&lt;p&gt;This release introduces major enhancements to our AI-powered UI exploration engine, delivering smarter and more adaptive dynamic scanning across modern applications. We've overhauled our SSL scanner to detect 15+ critical SSL/TLS vulnerabilities with improved precision, and rebuilt the taint analysis engine for deeper and more reliable vulnerability detection. The release also expands coverage for secrets detection, mobile misconfigurations, and modern CVEs. Across the board, platform performance has been refined for greater speed, stability, and accuracy.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Tue, 22 Jul 2025 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-07-22:/changelog-2025-07-23-july.html</guid><category>Product</category><category>UI</category><category>TLS</category><category>taint analysis</category><category>secrets</category><category>performance</category></item><item><title>Know Your App's Data Habits: A Deep Dive into Our Comprehensive Privacy Analysis</title><link>https://blog.ostorlab.co/comprehensive-privacy-analysis-mobile-apps.html</link><description>&lt;p&gt;Ostorlab's Privacy Scan automatically detects mismatches between what your app's privacy policy says and what it actually does. This comprehensive analysis of policy text, permissions, code, and UI elements helps mobile developers avoid compliance violations and build user trust through accurate privacy practices.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anas Zouiten</dc:creator><pubDate>Tue, 27 May 2025 10:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-05-27:/comprehensive-privacy-analysis-mobile-apps.html</guid><category>Product</category><category>privacy</category><category>mobile</category><category>compliance</category><category>gdpr</category><category>ccpa</category><category>iso 27701</category><category>security</category><category>android</category><category>ios</category></item><item><title>Ostorlab Security Scanner GitHub Integration</title><link>https://blog.ostorlab.co/ostorlab-security-scanner-github-integration.html</link><description>&lt;p&gt;The Ostorlab Security Scanner GitHub Integration enhances mobile app development workflows by embedding automated security directly into the CI/CD pipeline. It offers a GitHub Action for scanning mobile application on every code push. It adds inline vulnerability insights directly to pull requests, highlighting the exact code changes that introduced issues and suggesting one-click fixes developers can apply without leaving GitHub.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Abderrahim HADDADI</dc:creator><pubDate>Wed, 21 May 2025 16:20:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-05-21:/ostorlab-security-scanner-github-integration.html</guid><category>Product</category><category>github</category><category>security</category><category>ci/cd</category><category>mobile</category><category>devsecops</category></item><item><title>Scan, Sync, Remediate: Ostorlab Meets Vanta for Faster Audits</title><link>https://blog.ostorlab.co/scan-sync-remediate-ostorlab-meets-vanta-for-faster-audits.html</link><description>&lt;p&gt;This article announces the new integration between Ostorlab and Vanta, explains how it works, outlines the setup process, and highlights the key benefits for security and compliance teams.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mohamed El Yousfi</dc:creator><pubDate>Tue, 20 May 2025 12:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-05-20:/scan-sync-remediate-ostorlab-meets-vanta-for-faster-audits.html</guid><category>Product</category><category>security</category><category>ostorlab</category><category>vulnerabilities</category><category>vanta</category><category>compliance</category></item><item><title>Expanded Privacy Analysis, Attack Surface Profiling, and GitHub Source Mapping Improvements</title><link>https://blog.ostorlab.co/changelog-2025-05-12-may.html</link><description>&lt;p&gt;Ostorlab's May 2025 update delivers comprehensive privacy analysis capabilities with 21 new data collection categories and enhanced verification tools. This release introduces specialized Attack Surface scan profiles for optimized security assessments, adds GitHub source code integration for precise vulnerability mapping, and implements QPS rate limiting for controlled scanning. Additional improvements include mobile scan URL regex controls, streamlined Jira integration, and expanded fingerprinting capabilities for improved detection accuracy.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 12 May 2025 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-05-12:/changelog-2025-05-12-may.html</guid><category>Product</category><category>vulnerability management</category><category>scanning</category><category>security</category><category>privacy</category><category>compliance</category><category>fingerprinting</category><category>rate limiting</category></item><item><title>Bypassing Obfuscation in Android Apps: A Dual Approach with DalvikFLIRT and LLM-Powered Rewrites</title><link>https://blog.ostorlab.co/bypassing-obfuscation-android-app-dalvik-flirt-llm-powered-rewrites.html</link><description>&lt;p&gt;This research introduces a pioneering dual approach that combines signature-based matching (DalvikFLIRT) with LLM-powered code transformation to bypass sophisticated Android app obfuscation, enabling automated security analysis of previously impenetrable code.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Wed, 16 Apr 2025 10:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-04-16:/bypassing-obfuscation-android-app-dalvik-flirt-llm-powered-rewrites.html</guid><category>Security</category><category>ai</category><category>dalvik</category><category>obfuscation</category><category>llm</category><category>flirt</category></item><item><title>CNIL Standard Integration, SARIF Support, Copilot Enhancements, and Smarter Vulnerability Analysis.</title><link>https://blog.ostorlab.co/changelog-2025-04-07-april.html</link><description>&lt;p&gt;This release introduces CNIL standard support, SARIF export, and improved vulnerability insights with locations and advanced search. Copilot is more powerful, performance is faster, and asset and remediation workflows are smoother.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 07 Apr 2025 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2025-04-07:/changelog-2025-04-07-april.html</guid><category>Product</category><category>remediation</category><category>copilot</category><category>vulnerability management</category><category>attack surface</category><category>detection</category></item><item><title>From Moonshot to Production: Building Ostorlab Copilot</title><link>https://blog.ostorlab.co/from-moonshot-to-production-building-ostorlab-copilot.html</link><description>&lt;p&gt;This article outlines our journey in implementing ostorlab copilot, the challenges we encountered, and the lessons we learned along the way.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mouhcine Narhmouche</dc:creator><pubDate>Mon, 24 Feb 2025 10:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-02-24:/from-moonshot-to-production-building-ostorlab-copilot.html</guid><category>Product</category><category>ai</category><category>automation</category><category>copilot</category></item><item><title>Ostorlab's Security Scanner GitHub App,Ticket Aggregation V2, Copilot Launch, and Enhanced Security Features</title><link>https://blog.ostorlab.co/changelog-2025-02-20-february.html</link><description>&lt;p&gt;February's update introduces Ticket Aggregation V2 and Ostorlab Copilot, alongside improvements to reporting capabilities and detection mechanisms. These updates enhance vulnerability management, user experience, and security analysis across the platform.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Thu, 20 Feb 2025 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-02-20:/changelog-2025-02-20-february.html</guid><category>Product</category><category>remediation</category><category>copilot</category><category>ai</category><category>vulnerability management</category><category>attack surface</category><category>detection</category></item><item><title>Effective Vulnerability Ticketing System with Ostorlab</title><link>https://blog.ostorlab.co/vulnerability-ticketing-system.html</link><description>&lt;p&gt;This article announces Ostorlab's vulnerability ticketing system V2 and how it automates and streamlines the entire process of managing, and remediating security vulnerabilities through features like automated ticket creation, lifecycle management, policy enforcement, and integration with existing tools.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Tue, 18 Feb 2025 18:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-02-18:/vulnerability-ticketing-system.html</guid><category>Product</category><category>Vulnerability management</category><category>Ticketing</category><category>Issues</category><category>Remediation</category></item><item><title>AI-Automated Attack Surface Management: The Future of Cybersecurity Discovery</title><link>https://blog.ostorlab.co/ai-automated-attack-surface.html</link><description>&lt;p&gt;This article explores AI-automated attack surface management, its impact on cybersecurity, and how it automates asset discovery and vulnerability detection.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Fri, 14 Feb 2025 18:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-02-14:/ai-automated-attack-surface.html</guid><category>Product</category><category>Attack Surface</category><category>AI</category><category>Automation</category></item><item><title>AI-automated Attack surface, Privacy Analysis, Wordpress agent, and more.</title><link>https://blog.ostorlab.co/changelog-2025-01-20-january.html</link><description>&lt;p&gt;Ostorlab's January 2025 update introduces AI-powered attack surface discovery and improves IDE performance. The release expands detection capabilities with new secret and privacy checks, adds a WordPress security agent, and implements additional threat fingerprints and CVE support. A new Privacy profile for compliance analysis is launched, along with enhancements to scan options and vulnerability reporting. These updates aim to improve asset analysis, security assessments, and risk mitigation across various digital environments.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 20 Jan 2025 20:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2025-01-20:/changelog-2025-01-20-january.html</guid><category>Product</category><category>ai</category><category>privacy</category><category>wordpress</category><category>attack surface</category><category>threat center</category><category>oxo</category></item><item><title>Advanced Search Query, API Endpoints, Tons of new detections, and more.</title><link>https://blog.ostorlab.co/changelog-2024-12-02-december.html</link><description>&lt;p&gt;The December release introduces advanced inventory search with Python-like syntax, enhanced asset status filtering, API endpoint autodiscovery, and comprehensive scan summaries. Additionally, it adds GraphQL vulnerability detection, domain takeover prevention, new CVE detections, privacy compliance checks, and Jira integration improvements for streamlined issue management.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 02 Dec 2024 20:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-12-02:/changelog-2024-12-02-december.html</guid><category>Product</category><category>kev</category><category>search</category><category>graphql</category><category>attack surface</category><category>threat center</category><category>oxo</category></item><item><title>Pre-Auth Root RCE Vulnerability in CyberPanel: Deep Dive Exploit Analysis</title><link>https://blog.ostorlab.co/0-click-pre-auth-root-rce-vulnerability-in-cyberpanel.html</link><description>&lt;p&gt;A technical analysis of a vulnerability in CyberPanel, a Pre-Auth Root RCE, including confirmed exploitation paths, investigated components, and research methodology findings.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab</dc:creator><pubDate>Wed, 30 Oct 2024 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-10-30:/0-click-pre-auth-root-rce-vulnerability-in-cyberpanel.html</guid><category>Security</category><category>RCE</category><category>security</category><category>cyberpanel</category><category>cve-2024-51567</category><category>cve-2024-51568</category></item><item><title>Revamped Search, new detection capabilities, actively exploited CVEs and much more.</title><link>https://blog.ostorlab.co/changelog-2024-10-22-october.html</link><description>&lt;p&gt;The latest releases introduces a revamped search UI, new detection capabilities, attack surface &amp;amp; inventory performance improvements, plus much more.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Tue, 22 Oct 2024 20:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-10-22:/changelog-2024-10-22-october.html</guid><category>Product</category><category>kev</category><category>search</category><category>remediation</category><category>attack surface</category><category>threat center</category><category>4xx bypass</category></item><item><title>Defending Against GraphQL Attacks: A Deep Dive into Common Vulnerabilities</title><link>https://blog.ostorlab.co/defending-against-graphQL-attacks.html</link><description>&lt;p&gt;This article is an in-depth look at the most common GraphQL vulnerabilities, why they occur, and how they can be mitigated.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mouhcine Narhmouche</dc:creator><pubDate>Mon, 21 Oct 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-10-21:/defending-against-graphQL-attacks.html</guid><category>Security</category><category>GraphQL</category><category>Security</category><category>API</category><category>Vulnerabilities</category></item><item><title>Assessing the Large-Scale Exposure of CUPS Vulnerabilities: Chained CVEs Leading to Remote Code Execution</title><link>https://blog.ostorlab.co/cups-vulnerabilities.html</link><description>&lt;p&gt;This article assesses the large-scale exposure of systems to multiple CVEs affecting the CUPS printing service, which can be chained together to achieve unauthenticated remote code execution (RCE). We provide an overview of how these vulnerabilities, including CVE-2024-47176, work in tandem, walking through the exploit flow. Additionally, we analyze how many systems are potentially vulnerable and highlight a unique behavior observed during testing.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Youssef Badaoui</dc:creator><pubDate>Wed, 16 Oct 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-10-16:/cups-vulnerabilities.html</guid><category>Security</category><category>cups</category><category>security</category><category>vulnerability</category><category>foomatic-rip</category></item><item><title>Threat Center v2: Staying Ahead of Vulnerabilities</title><link>https://blog.ostorlab.co/threat-center-v2.html</link><description>&lt;p&gt;The Threat Center provides essential updates for organizations to stay informed about security threats, offering actionable intelligence and detailed asset information to help users proactively protect their systems.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adnane Serrar</dc:creator><pubDate>Thu, 10 Oct 2024 12:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-10-10:/threat-center-v2.html</guid><category>Engineering</category><category>security</category><category>ostorlab</category><category>vulnerabilities</category><category>threat</category></item><item><title>Deep Dive: Stored XSS Vulnerability in LiteSpeed Cache Plugin for WordPress (CVE-2024-47374)</title><link>https://blog.ostorlab.co/litespeed-cache,cve-2024-47374.html</link><description>&lt;p&gt;An in-depth look at the CVE-2024-47374 vulnerability affecting LiteSpeed Cache plugin for WordPress, its impact, and a technical breakdown of our detection method.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nour Eddine Masdoufi</dc:creator><pubDate>Thu, 10 Oct 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-10-10:/litespeed-cache,cve-2024-47374.html</guid><category>Security</category><category>xss</category><category>kev</category><category>security</category><category>wordpress</category><category>cve-2024-47374</category></item><item><title>HTTP2, Private Custom Checks, actively exploited CVE and much more.</title><link>https://blog.ostorlab.co/changelog-2024-10-07-october.html</link><description>&lt;p&gt;The latest releases introduce HTTP/2 support, improve UI and detection, enhance privacy and security measures, and update custom checks and analysis environments for better performance.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 07 Oct 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-10-07:/changelog-2024-10-07-october.html</guid><category>Product</category><category>http2</category><category>kev</category><category>oxo</category><category>oxotitan</category><category>api autodiscovery</category><category>attack surface</category><category>threat center</category><category>custom agent</category><category>4xx bypass</category></item><item><title>Actively Exploited CVE-2022-21445, Deep Dive</title><link>https://blog.ostorlab.co/oracle_application_development_framework.html</link><description>&lt;p&gt;The article delves into the technical details of this CVE, its potential impact, and the methods used to detect and exploit it.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nour Eddine Masdoufi</dc:creator><pubDate>Wed, 25 Sep 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-09-25:/oracle_application_development_framework.html</guid><category>Security</category><category>rce</category><category>kev</category><category>security</category></item><item><title>Unraveling the VigorConnect Vulnerability: A Journey of Discovery and Correction</title><link>https://blog.ostorlab.co/vulnerability-vigorconnect-cve-2021-20123.html</link><description>&lt;p&gt;The article uncovers an Arbitrary File Read vulnerability in VigorConnect that lets attackers access sensitive files. The issue originates from improper input validation in file handling methods.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nour Eddine Masdoufi</dc:creator><pubDate>Thu, 12 Sep 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-09-12:/vulnerability-vigorconnect-cve-2021-20123.html</guid><category>Security</category><category>afr</category><category>vigorconnect</category><category>security</category><category>kev</category><category>cve-2021-20123</category></item><item><title>Enhanced Vulnerability Detection, Expanded Features, and Critical Fixes</title><link>https://blog.ostorlab.co/changelog-2024-09-09-september.html</link><description>&lt;p&gt;This update introduces enhanced vulnerability detection with AI improvements, new UI features, expanded support for asset types, upgraded network interception, and broader CVE coverage, alongside several bug fixes and optimizations across scanning, fingerprinting, and GitHub Actions.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 09 Sep 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-09-09:/changelog-2024-09-09-september.html</guid><category>Product</category><category>ui</category><category>api</category><category>oxo</category><category>flutter</category><category>dynamic</category><category>taint</category><category>threat center</category><category>github</category></item><item><title>OXO Titan, Support for CVSS4, and Attack Surface search with certificates</title><link>https://blog.ostorlab.co/changelog-2024-08-28-august.html</link><description>&lt;p&gt;Our latest release features a new OnPrem UI, better PDF Reports with insightful graphs, support for CVSS4, plus much more.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Wed, 28 Aug 2024 16:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-08-28:/changelog-2024-08-28-august.html</guid><category>Product</category><category>OXO</category><category>PDF</category><category>Attack Surface</category><category>Detection</category></item><item><title>OXO Titan UI: Simplifying Security Scanning for Everyone</title><link>https://blog.ostorlab.co/ostorlab-oxo-titan-ui.html</link><description>&lt;p&gt;OXO Titan UI encapsulates OXO's capabilities within an accessible interface, democratizing advanced security scanning techniques. This article explores OXO Titan's journey from concept to reality, highlighting its key features and presenting a practical user workflow example.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mohamed El Yousfi</dc:creator><pubDate>Mon, 26 Aug 2024 16:16:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-08-26:/ostorlab-oxo-titan-ui.html</guid><category>Engineering</category><category>opensource</category><category>security</category><category>oxo</category><category>oxotitan</category></item><item><title>Privacy Compliance Testing, Fingerprint detection, and User Experience Enhancements</title><link>https://blog.ostorlab.co/changelog-2024-08-12-august.html</link><description>&lt;p&gt;Dive into our latest release featuring the introduction of Privacy Compliance Testing, new detection of several fingerprints, and User Experience Enhancements.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 12 Aug 2024 14:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-08-12:/changelog-2024-08-12-august.html</guid><category>Product</category><category>privacy</category><category>asteroid</category><category>whatweb</category><category>ux</category></item><item><title>Threat Center, Account Security Enhancements, and added detection</title><link>https://blog.ostorlab.co/changelog-2024-08-05-august.html</link><description>&lt;p&gt;Dive into our latest release featuring the introduction of a Threat Center, enhanced account security, and new detection.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 05 Aug 2024 13:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-08-05:/changelog-2024-08-05-august.html</guid><category>Product</category><category>threat-center</category><category>account-security</category></item><item><title>Advanced Techniques for Bypassing 403 Errors</title><link>https://blog.ostorlab.co/403-bypass.html</link><description>&lt;p&gt;Discover the comprehensive techniques that are commonly used to bypass 403 errors. Learn about the various methods used, including HTTP method fuzzing, request header manipulation, parameter tampering, and more.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Othmane Hachim</dc:creator><pubDate>Mon, 05 Aug 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-08-05:/403-bypass.html</guid><category>Security</category><category>403</category><category>bypass</category><category>fuzzing</category><category>security</category></item><item><title>Advanced XSS Protection, CircleCI Enhancements, and UI Upgrades in Our Latest Release</title><link>https://blog.ostorlab.co/changelog-2024-07-31-july.html</link><description>&lt;p&gt;Dive into our latest release featuring cutting-edge XSS detection, streamlined CircleCI workflows, sleek UI enhancements, and robust security integrations with Codecov and UV—designed to empower and secure your digital experience.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Wed, 31 Jul 2024 15:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-07-31:/changelog-2024-07-31-july.html</guid><category>Product</category><category>xss</category><category>circleci</category><category>ui</category><category>codecov</category></item><item><title>Revolutionizing Mobile Security Testing with Ostorlab's AI-Powered Monkey Tester</title><link>https://blog.ostorlab.co/ai-monkey-tester.html</link><description>&lt;p&gt;Introducing the AI-powered Monkey Tester in the Ostorlab mobile vulnerability scanner, significantly boosting test coverage and speed for a more comprehensive and efficient testing experience.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Tue, 16 Jul 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-07-16:/ai-monkey-tester.html</guid><category>Product</category><category>monkeytester</category><category>ai</category><category>ui</category></item><item><title>CVE-2024-5315 Dolibarr SQL Injection Investigation</title><link>https://blog.ostorlab.co/dolibarr-sql-injection-cve.html</link><description>&lt;p&gt;CVE-2024-5315, an actively exploited Dolibarr SQL Injection with in incorrect patched-in version.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Youssef Badaoui</dc:creator><pubDate>Sun, 14 Jul 2024 09:14:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-07-14:/dolibarr-sql-injection-cve.html</guid><category>Security</category><category>web</category><category>dolibarr</category><category>sqli</category><category>security</category><category>cve</category><category>kev</category></item><item><title>Detection of CocoaPods Supply Chain Vulnerability, CCPA, SOC2 and more</title><link>https://blog.ostorlab.co/changelog-2024-07-08-july.html</link><description>&lt;p&gt;This update introduces new detection capabilities, new data &amp;amp; privacy controls, improved user experience across the platform, and bug fixes.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 08 Jul 2024 15:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-07-08:/changelog-2024-07-08-july.html</guid><category>Product</category><category>detection</category><category>attack surface</category><category>inventory</category><category>bug fixes</category></item><item><title>CocoaPods Supply Chain Fire: What Should You Know</title><link>https://blog.ostorlab.co/cocoapods-supplychain-fire.html</link><description>&lt;p&gt;E.V.A Information Security uncovered critical vulnerabilities in CocoaPods, leading to immediate patches, and developers must now remove unclaimed packages, verify dependencies, and scan their applications to ensure security.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Wed, 03 Jul 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-07-03:/cocoapods-supplychain-fire.html</guid><category>Security</category><category>supplychain</category><category>cocoapods</category><category>fire</category></item><item><title>Bug Fixes, Detection, and Attack Surface Improvements</title><link>https://blog.ostorlab.co/changelog-2024-07-01-july.html</link><description>&lt;p&gt;This update introduces bug fixes, detection improvements, and attack surface enhancements to provide a more seamless user experience.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 01 Jul 2024 16:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-07-01:/changelog-2024-07-01-july.html</guid><category>Product</category><category>remediation</category><category>attack surface</category><category>inventory</category><category>detection</category><category>bug fixes</category><category>scanning</category></item><item><title>iOS TestFlight scan, Slack Integrations and other improvements</title><link>https://blog.ostorlab.co/changelog-2024-06-10-june.html</link><description>&lt;p&gt;This update introduces support for scanning apps using iOS TestFlight, Slack Integrations, support for scanning web apps with an SBOM, and other improvements.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 10 Jun 2024 19:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-06-10:/changelog-2024-06-10-june.html</guid><category>Product</category><category>integrations</category><category>dynamic</category><category>security</category><category>remediation</category></item><item><title>Integrations, Dynamic analysis improvements, and a new standard support</title><link>https://blog.ostorlab.co/changelog-2024-05-27-may.html</link><description>&lt;p&gt;This update introduces multiple new integrations with CI/CD pipelines, improvements to dynamic traces interception &amp;amp; analysis, support for the MASVS v2.0.0 standard, and many bug fixes.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 27 May 2024 04:42:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-05-27:/changelog-2024-05-27-may.html</guid><category>Product</category><category>integrations</category><category>dynamic</category><category>security</category><category>remediation</category></item><item><title>Discovery of hidden web paths, detection of libwebp vulnerability, and new CVE detections.</title><link>https://blog.ostorlab.co/changelog-2024-05-06-may.html</link><description>&lt;p&gt;This update adds the discovery of hidden web paths, detection of libwebp vulnerability, and new CVE detections.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 06 May 2024 18:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-05-06:/changelog-2024-05-06-may.html</guid><category>Product</category><category>detection</category><category>web security</category><category>opensource</category><category>oxo</category></item><item><title>🚀 OXO v1.0!</title><link>https://blog.ostorlab.co/ostorlab-oxo-v1.html</link><description>&lt;p&gt;OXO version 1.0, is 10x times faster, supports ARM64 architectures, and is packed with improved capabilities like scanning multiple assets, simpler and powerful CLI.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 29 Apr 2024 18:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-04-29:/ostorlab-oxo-v1.html</guid><category>Engineering</category><category>opensource</category><category>security</category><category>oxo</category></item><item><title>Better UI, more concise scan report, improved detection of insecure webview usage, and multiple bug fixes.</title><link>https://blog.ostorlab.co/changelog-2024-04-23-april.html</link><description>&lt;p&gt;This update improves the user interface of the platform, adds new detection for Webview-related vulnerabilities, and ships multiple bug fixes.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Tue, 23 Apr 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-04-23:/changelog-2024-04-23-april.html</guid><category>Product</category><category>detection</category><category>UI</category></item><item><title>Apple Privacy: A Comprehensive Guide to Privacy Manifest Files</title><link>https://blog.ostorlab.co/apple-privacy-manifest-file.html</link><description>&lt;p&gt;This article offers a guide to Privacy Manifest files in Apple's ecosystem, stressing their importance for transparency and compliance, especially with the upcoming 2024 mandate, outlining steps for implementation, and underscoring their role in promoting user trust and adherence to regulations.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Amine Mesbahi</dc:creator><pubDate>Thu, 18 Apr 2024 18:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-04-18:/apple-privacy-manifest-file.html</guid><category>Engineering</category><category>apple</category><category>privacy manifest</category><category>xcprivacy</category></item><item><title>Objective C instrumentation, detection of insecure data storage, Regex DoS, and multiple bug fixes.</title><link>https://blog.ostorlab.co/changelog-2024-04-15-april.html</link><description>&lt;p&gt;This update significantly improves objective-C instrumentation, adds new detection for insecure data storage and Regex DoS, and ships multiple bug fixes.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 15 Apr 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-04-15:/changelog-2024-04-15-april.html</guid><category>Product</category><category>detection</category><category>objective-c</category></item><item><title>Enhancing PostMessage XSS Detection with Proxy Object Instrumentation</title><link>https://blog.ostorlab.co/postmessage-xss-proxy-object-instrumentation.html</link><description>&lt;p&gt;The article introduces a new method for detecting PostMessage Cross-Site Scripting (XSS) vulnerabilities using JavaScript Proxy objects, which enhances traditional dynamic fuzzing techniques.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alaeddine Mesbahi</dc:creator><pubDate>Thu, 04 Apr 2024 18:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-04-04:/postmessage-xss-proxy-object-instrumentation.html</guid><category>Engineering</category><category>xss</category><category>postmessage</category><category>instrumentation</category></item><item><title>Ostorlab KEV update for 02 April 2024</title><link>https://blog.ostorlab.co/ostorlab-kev-02-april-2024.html</link><description>&lt;p&gt;New vulnerabilities added to Ostorlab known exploited vulnerabilities catalog&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Tue, 02 Apr 2024 00:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-04-02:/ostorlab-kev-02-april-2024.html</guid><category>Security</category><category>CISA</category><category>KEV</category><category>vulnerabilities</category></item><item><title>Detection of Apple's Privacy Manifest, liblzma backdoor, and Attack Surface fixes.</title><link>https://blog.ostorlab.co/changelog-2024-04-01-april.html</link><description>&lt;p&gt;This update introduces fixes for the Attack Surface, detection for the liblzma backdoor, and a public store for agents.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 01 Apr 2024 15:00:00 +0200</pubDate><guid>tag:blog.ostorlab.co,2024-04-01:/changelog-2024-04-01-april.html</guid><category>Product</category><category>oss</category><category>attack surface</category><category>detection</category></item><item><title>Discovering &amp; Monitoring Mobile Applications Attack Surface with Ostorlab</title><link>https://blog.ostorlab.co/monitor-mobile-application-attack-surface.html</link><description>&lt;p&gt;The article introduces Ostorlab Attack Surface Discovery as a solution for discovering and continuously monitoring mobile applications, alleviating the manual burden on security teams. It outlines steps for adding applications to an inventory, configuring monitoring rules, and emphasizes the platform's ability to streamline mobile application security management.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Amine Mesbahi</dc:creator><pubDate>Tue, 26 Mar 2024 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-03-26:/monitor-mobile-application-attack-surface.html</guid><category>Product</category><category>mobile attack surface</category><category>security</category><category>permissions</category></item><item><title>Addition of CSS Injection Detection, ARM64 support, and migration of Agent's Docker Images.</title><link>https://blog.ostorlab.co/changelog-2024-03-25-march.html</link><description>&lt;p&gt;This update introduces fixes for the Attack Surface, migration of Agent's Docker Images to Docker Hub, enhanced detection capabilities for vulnerabilities, and support for ARM64 architecture in OSS.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 25 Mar 2024 11:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-03-25:/changelog-2024-03-25-march.html</guid><category>Product</category><category>OSS</category><category>Attack Surface</category><category>Detection</category><category>XSS</category></item><item><title>Security Landscape of Mobile Banking Applications in North America</title><link>https://blog.ostorlab.co/security-mobile-banking-app-landscape-na-2024.html</link><description>&lt;p&gt;This article examines the security of mobile banking applications in North America, uncovering widespread vulnerabilities and the urgent need for enhanced cybersecurity measures. It highlights the fast-paced technological advancements in the sector, alongside challenges such as supply chain vulnerabilities and the adoption of potentially insecure programming practices.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Tue, 19 Mar 2024 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-03-19:/security-mobile-banking-app-landscape-na-2024.html</guid><category>Security</category><category>mobile banking</category><category>security</category><category>research</category></item><item><title>Exposed Scan PCAP and JIRA custom Mapping</title><link>https://blog.ostorlab.co/changelog-2024-03-18-march.html</link><description>&lt;p&gt;This update introduces a series of new features related to the IDE, Jira integration, OXO, and many improvements to the platform.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 18 Mar 2024 04:42:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-03-18:/changelog-2024-03-18-march.html</guid><category>Product</category><category>oss</category><category>remediation</category><category>jira</category><category>attack surface</category></item><item><title>Enhancements to the Open Source CLI, Platform, and Detection.</title><link>https://blog.ostorlab.co/changelog-2024-03-[11]()-march.html</link><description>&lt;p&gt;This update introduces various improvements to the XSS scanner, the functionality of the open-source CLI, and monitoring rule creation.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 11 Mar 2024 17:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-03-11:/changelog-2024-03-[11]()-march.html</guid><category>Product</category><category>OSS</category><category>Attack Surface</category><category>Integration</category></item><item><title>Swift Under the Microscope: Practical Dynamic Instrumentation</title><link>https://blog.ostorlab.co/swift-dynamic-instrumentation.html</link><description>&lt;p&gt;Article on Swift Dynamic Instrumentation. The article explains the steps to perform dynamic analysis of Swift-based application, covering name mangling, Swift ABI &amp;amp; extraction of function arguments in Swift.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Abderrahim Haddadi</dc:creator><pubDate>Mon, 11 Mar 2024 00:42:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-03-11:/swift-dynamic-instrumentation.html</guid><category>Engineering</category><category>swift</category><category>dynamic</category><category>reversing</category><category>instrumentation</category></item><item><title>Ostorlab KEV update for 11th March 2024</title><link>https://blog.ostorlab.co/ostorlab-kev-11-march-2024.html</link><description>&lt;p&gt;New vulnerabilities added to Ostorlab known exploited vulnerabilities catalog&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 11 Mar 2024 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-03-11:/ostorlab-kev-11-march-2024.html</guid><category>Security</category><category>CISA</category><category>KEV</category><category>vulnerabilities</category></item><item><title>Attack Surface, Remediation, Automation Rules, and Detection improvements</title><link>https://blog.ostorlab.co/changelog-2024-03-04-march.html</link><description>&lt;p&gt;This update introduce a series of updates aimed at enhancing user experience, platform improvements, and bug fixes across various features.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 04 Mar 2024 15:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-03-04:/changelog-2024-03-04-march.html</guid><category>Product</category><category>remediation</category><category>oss</category><category>attack surface</category><category>automation rules</category></item><item><title>OXO Open-Source Improving</title><link>https://blog.ostorlab.co/changelog-2024-02-26-february.html</link><description>&lt;p&gt;The latest update of OXO open-source introduces substantial improvements, providing users with faster startup and execution times. Additionally, this update enhances search capabilities in the CLI for more effective querying. Users now also benefit from increased customization options, including the ability to define accepted agents and specify in_selector in the agent group definition.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 26 Feb 2024 10:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-02-26:/changelog-2024-02-26-february.html</guid><category>Product</category><category>oss</category><category>oxo</category></item><item><title>Ostorlab KEV update for 26th February 2024</title><link>https://blog.ostorlab.co/ostorlab-kev-feb-2024.html</link><description>&lt;p&gt;New vulnerabilities added to Ostorlab known exploited vulnerabilities catalog&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 26 Feb 2024 00:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-02-26:/ostorlab-kev-feb-2024.html</guid><category>Security</category><category>CISA</category><category>KEV</category><category>vulnerabilities</category></item><item><title>Test Credential Name</title><link>https://blog.ostorlab.co/changelog-2024-02-19-february.html</link><description>&lt;p&gt;The latest update introduces the addition of a "test credential name" feature, allowing users to label test credentials for easier identification and management.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ostorlab Team</dc:creator><pubDate>Mon, 19 Feb 2024 10:00:00 +0100</pubDate><guid>tag:blog.ostorlab.co,2024-02-19:/changelog-2024-02-19-february.html</guid><category>Product</category><category>test credentials</category></item></channel></rss>