{"id":"fc9baa03-532e-4863-97b1-aa08d90e2cef","timestamp":1775570672229,"matcher":{"static":{"/pricing":{"redirect":"/"},"/blog":{"redirect":"/news"},"/blog/dont-fear-the-ai-reaper-using-llms-to-hack-better-and-faster":{"redirect":"/news/blog/dont-fear-the-ai-reaper-using-llms-to-hack-better-and-faster"},"/blog/bug-bounty-vs-pentesting-for-saas-which-one-should-you-choose":{"redirect":"/news/blog/bug-bounty-vs-pentesting-for-saas-which-one-should-you-choose"},"/blog/bypassing-wafs-for-fun-and-js-injection-with-parameter-pollution":{"redirect":"/news/blog/bypassing-wafs-for-fun-and-js-injection-with-parameter-pollution"},"/blog/catch-them-early-integrate-automated-pentesting-in-your-cicd-pipeline":{"redirect":"/news/blog/catch-them-early-integrate-automated-pentesting-in-your-cicd-pipeline"},"/blog/cleaning-the-portal-ux-improvements-to-the-way-you-use-ethiack":{"redirect":"/news/blog/cleaning-the-portal-ux-improvements-to-the-way-you-use-ethiack"},"/blog/como-cumprir-com-a-nis2-guia-para-pmes-portuguesas":{"redirect":"/news/blog/como-cumprir-com-a-nis2-guia-para-pmes-portuguesas"},"/blog/como-fazer-um-inventário-de-ativos-para-cibersegurança":{"redirect":"/news/blog/como-fazer-um-inventário-de-ativos-para-cibersegurança"},"/blog/continuous-security-assurance-for-compliancewise-adapting-to-an-ever-evolving-landscape":{"redirect":"/news/blog/continuous-security-assurance-for-compliancewise-adapting-to-an-ever-evolving-landscape"},"/blog/digital-exposure-analysis-of-the-500-largest-portuguese-companies":{"redirect":"/news/blog/digital-exposure-analysis-of-the-500-largest-portuguese-companies"},"/blog/dont-stop-the-party-how-baladapp-is-keeping-their-users-safe-with-autonomous-ethical-hacking":{"redirect":"/news/blog/dont-stop-the-party-how-baladapp-is-keeping-their-users-safe-with-autonomous-ethical-hacking"},"/blog/ethiack-214-test-internal-assets-cicd-sso-new-reports-and-more":{"redirect":"/news/blog/ethiack-214-test-internal-assets-cicd-sso-new-reports-and-more"},"/blog/ethiack-beacon-easily-test-your-internal-assets":{"redirect":"/news/blog/ethiack-beacon-easily-test-your-internal-assets"},"/blog/ethiack-distinguished-as-a-leader-in-innovation-in-portugal":{"redirect":"/news/blog/ethiack-distinguished-as-a-leader-in-innovation-in-portugal"},"/blog/ethiack-featured-in-the-portugal-fintech-report-2023":{"redirect":"/news/blog/ethiack-featured-in-the-portugal-fintech-report-2023"},"/blog/ethiack-raises-a-4-million-funding-round-to-develop-ai-powered-hackbots":{"redirect":"/news/blog/ethiack-raises-a-4-million-funding-round-to-develop-ai-powered-hackbots"},"/blog/ethiacks-journey-with-google-for-startups-in-the-growth-academy-ai-for-cybersecurity":{"redirect":"/news/blog/ethiacks-journey-with-google-for-startups-in-the-growth-academy-ai-for-cybersecurity"},"/blog/everything-financial-institutions-need-to-know-about-the-nis2-directive":{"redirect":"/news/blog/everything-financial-institutions-need-to-know-about-the-nis2-directive"},"/blog/extended-capabilities-for-ethiacks-api-whats-changing":{"redirect":"/news/blog/extended-capabilities-for-ethiacks-api-whats-changing"},"/blog/find-the-needle-in-the-haystack-with-advanced-filters-for-attack-surface-management":{"redirect":"/news/blog/find-the-needle-in-the-haystack-with-advanced-filters-for-attack-surface-management"},"/blog/from-checklist-based-pentesting-to-autonomous-ethical-hacking-what-changed-for-cegid":{"redirect":"/news/blog/from-checklist-based-pentesting-to-autonomous-ethical-hacking-what-changed-for-cegid"},"/blog/from-compliance-to-continuous-security-ethiack-s-vision-for-financial-cybersecurity":{"redirect":"/news/blog/from-compliance-to-continuous-security-ethiack-s-vision-for-financial-cybersecurity"},"/blog/from-compliance-to-continuous-security-ethiacks-vision-for-financial-cybersecurity":{"redirect":"/news/blog/from-compliance-to-continuous-security-ethiacks-vision-for-financial-cybersecurity"},"/blog/full-walkthrough-ethiack-20":{"redirect":"/news/blog/full-walkthrough-ethiack-20"},"/blog/git-arbitrary-configuration-injection-cve-2023-29007":{"redirect":"/news/blog/git-arbitrary-configuration-injection-cve-2023-29007"},"/blog/hello-world":{"redirect":"/news/blog/hello-world"},"/blog/how-ethiack-helps-zick-learn-protect-their-relationships-with-enterprise-clients":{"redirect":"/news/blog/how-ethiack-helps-zick-learn-protect-their-relationships-with-enterprise-clients"},"/blog/how-to-use-ai-and-automation-for-ethical-hacking-and-vulnerability-assessment":{"redirect":"/news/blog/how-to-use-ai-and-automation-for-ethical-hacking-and-vulnerability-assessment"},"/blog/identifying-vulnerabilities-in-saas-the-guide-updated-for-2023":{"redirect":"/news/blog/identifying-vulnerabilities-in-saas-the-guide-updated-for-2023"},"/blog/if-you-want-peace-prepare-for-cyberwar":{"redirect":"/news/blog/if-you-want-peace-prepare-for-cyberwar"},"/blog/making-portugal-more-cyber-secure-at-c-days-2024":{"redirect":"/news/blog/making-portugal-more-cyber-secure-at-c-days-2024"},"/blog/meet-idroid-automated-pentesting-for-android-apps":{"redirect":"/news/blog/meet-idroid-automated-pentesting-for-android-apps"},"/blog/navigating-dora-how-continuous-penetration-testing-bolsters-your-ict-risk-management-framework-and-contributes-to-overall-compliance":{"redirect":"/news/blog/navigating-dora-how-continuous-penetration-testing-bolsters-your-ict-risk-management-framework-and-contributes-to-overall-compliance"},"/blog/navigating-dora-what-every-financial-institution-needs-to-know":{"redirect":"/news/blog/navigating-dora-what-every-financial-institution-needs-to-know"},"/blog/pentesting-no-more-why-its-time-to-move-from-pentesting-to-ethical-hacking":{"redirect":"/news/blog/pentesting-no-more-why-its-time-to-move-from-pentesting-to-ethical-hacking"},"/blog/protecting-critical-software-with-machine-ethical-hacking":{"redirect":"/news/blog/protecting-critical-software-with-machine-ethical-hacking"},"/blog/quo-vadis-cybersecurity":{"redirect":"/news/blog/quo-vadis-cybersecurity"},"/blog/rez0-joins-ethiack-to-advance-ai-offensive-security":{"redirect":"/news/blog/rez0-joins-ethiack-to-advance-ai-offensive-security"},"/blog/risk-assessment-what-is-it-and-how-to-conduct-one":{"redirect":"/news/blog/risk-assessment-what-is-it-and-how-to-conduct-one"},"/blog/roll-out-the-ethiacker-awards-celebrating-the-best-ethical-hackers-of-2024":{"redirect":"/news/blog/roll-out-the-ethiacker-awards-celebrating-the-best-ethical-hackers-of-2024"},"/blog/scaling-security-how-uporto-and-ethiack-protected-5000-assets-with-ai-powered-intelligence":{"redirect":"/news/blog/scaling-security-how-uporto-and-ethiack-protected-5000-assets-with-ai-powered-intelligence"},"/blog/securing-industrial-data-for-smartex-with-continuous-pentesting":{"redirect":"/news/blog/securing-industrial-data-for-smartex-with-continuous-pentesting"},"/blog/securing-success-ethiack-is-the-most-promising-startup-at-web-summit-2023":{"redirect":"/news/blog/securing-success-ethiack-is-the-most-promising-startup-at-web-summit-2023"},"/blog/small-and-safe-how-wallim-uses-machine-ethical-hacking-to-keep-their-applications-and-users-data-safe":{"redirect":"/news/blog/small-and-safe-how-wallim-uses-machine-ethical-hacking-to-keep-their-applications-and-users-data-safe"},"/blog/strengthening-cybersecurity-at-ana-aeroportos-with-ethiacks-ethical-hacking":{"redirect":"/news/blog/strengthening-cybersecurity-at-ana-aeroportos-with-ethiacks-ethical-hacking"},"/blog/the-cybersecurity-union-notes-from-enisas-cybersecurity-conference":{"redirect":"/news/blog/the-cybersecurity-union-notes-from-enisas-cybersecurity-conference"},"/blog/united-against-cyber-enemies":{"redirect":"/news/blog/united-against-cyber-enemies"},"/blog/updates-to-ethiacks-pricing-what-you-need-to-know":{"redirect":"/news/blog/updates-to-ethiacks-pricing-what-you-need-to-know"},"/blog/upgrading-from-annual-pentests-to-automated-pentests-secfixs-story":{"redirect":"/news/blog/upgrading-from-annual-pentests-to-automated-pentests-secfixs-story"},"/blog/webinar-cybersecurity-in-supply-chain-start-with-prevention":{"redirect":"/news/blog/webinar-cybersecurity-in-supply-chain-start-with-prevention"},"/blog/were-now-iso-27001-certified-heres-what-this-means-for-you":{"redirect":"/news/blog/were-now-iso-27001-certified-heres-what-this-means-for-you"},"/blog/what-is-a-pentest-how-ethical-hacking-can-protect-you":{"redirect":"/news/blog/what-is-a-pentest-how-ethical-hacking-can-protect-you"},"/blog/whats-new-in-ethiack-main-product-updates-on-v227-v228-and-v229":{"redirect":"/news/blog/whats-new-in-ethiack-main-product-updates-on-v227-v228-and-v229"},"/blog/why-is-soc-2-important-for-startups-a-guide-for-ctos":{"redirect":"/news/blog/why-is-soc-2-important-for-startups-a-guide-for-ctos"},"/blog/you-dont-cut-corners-in-cybersecurity-our-black-friday-motto":{"redirect":"/news/blog/you-dont-cut-corners-in-cybersecurity-our-black-friday-motto"},"/blog/grafana-cve-2025-6023-bypass-a-technical-deep-dive":{"redirect":"/news/research/grafana-cve-2025-6023-bypass-a-technical-deep-dive"},"/blog/introducing-the-hackian-an-ai-agent-that-can-hack":{"redirect":"/news/product/introducing-hackian"},"/blog/supercharging-bug-bounty-hunting-with-ai":{"redirect":"/news/blog/supercharging-bug-bounty-hunting-with-ai"},"/blog/ai-automation-ethical-hacking-vulnerability-assessment":{"redirect":"/news/blog/how-to-use-ai-and-automation-for-ethical-hacking-and-vulnerability-assessment"},"/blog.ethiack.com/blog/ethiack-culture-we-test-when-we-test":{"redirect":"/news/blog/ethiack-culture-we-test-when-we-test"},"/about":{"redirect":"/"},"/privacy-policy":{"redirect":"/legal/privacy-policy"},"/terms":{"redirect":"/legal/terms-of-service"},"/news/blog/one-click-rce-clawdbot":{"redirect":"/news/blog/one-click-rce-openclaw"},"/news/blog/from-compliance-to-continuous-security-ethiack-s-vision-for-financial-cybersecurity":{"redirect":"/news/blog/from-compliance-to-continuous-security-ethiacks-vision-for-financial-cybersecurity"},"/news/blog/one-click-rce-moltbot":{"redirect":"/news/blog/one-click-rce-openclaw"}},"wildcard":{},"dynamic":{}},"prerendered":["/","/legal/security-policy","/legal/ethiack-portal-ipn","/legal/privacy-policy","/legal/terms-of-service","/news/news/you-dont-cut-corners-in-cybersecurity-our-black-friday-motto","/news","/news/news/quo-vadis-cybersecurity","/news/news/united-against-cyber-enemies","/news/product/mongodb-memory-exposure","/news/case-studies/how-ethiack-helps-zick-learn-protect-their-relationships-with-enterprise-clients","/news/news/if-you-want-peace-prepare-for-cyberwar","/news/blog/security-roi","/news/case-studies/securing-industrial-data-for-smartex-with-continuous-pentesting","/news/case-studies/scaling-security-how-uporto-and-ethiack-protected-5000-assets-with-ai-powered-intelligence","/news/case-studies/strengthening-cybersecurity-at-ana-aeroportos-with-ethiacks-ethical-hacking","/news/blog/one-click-rce-openclaw","/news/product/understanding-risk-score","/news/product/beacon-version-two","/news/blog/ai-hacking-2026","/news/blog/digital-exposure-to-cybercrime-european-retail","/news/product/hackian-ghosts-in-business-logic","/news/product/were-now-iso-27001-certified-heres-what-this-means-for-you","/news/product/ethiack-beacon-easily-test-your-internal-assets","/news/case-studies/small-and-safe-how-wallim-uses-machine-ethical-hacking-to-keep-their-applications-and-users-data-safe","/news/case-studies/protecting-critical-software-with-machine-ethical-hacking","/news/case-studies/dont-stop-the-party-how-baladapp-is-keeping-their-users-safe-with-autonomous-ethical-hacking","/news/product/introducing-hackian","/news/case-studies/from-checklist-based-pentesting-to-autonomous-ethical-hacking-what-changed-for-cegid","/news/product/introducing-verifier","/news/product/extended-capabilities-for-ethiacks-api-whats-changing","/news/blog/roll-out-the-ethiacker-awards-celebrating-the-best-ethical-hackers-of-2024","/news/blog/digital-exposure-analysis-of-the-500-largest-portuguese-companies","/news/blog/everything-financial-institutions-need-to-know-about-the-nis2-directive","/news/product/whats-new-in-ethiack-main-product-updates-on-v227-v228-and-v229","/news/product/catch-them-early-integrate-automated-pentesting-in-your-cicd-pipeline","/news/product/cleaning-the-portal-ux-improvements-to-the-way-you-use-ethiack","/news/case-studies/upgrading-from-annual-pentests-to-automated-pentests-secfixs-story","/news/product/full-walkthrough-ethiack-20","/news/case-studies/continuous-security-assurance-for-compliancewise-adapting-to-an-ever-evolving-landscape","/news/product/ethiack-214-test-internal-assets-cicd-sso-new-reports-and-more","/news/blog/ethiack-raises-a-4-million-funding-round-to-develop-ai-powered-hackbots","/news/product/find-the-needle-in-the-haystack-with-advanced-filters-for-attack-surface-management","/news/blog/git-arbitrary-configuration-injection-cve-2023-29007","/news/blog/bypassing-wafs-for-fun-and-js-injection-with-parameter-pollution","/news/blog/pentesting-no-more-why-its-time-to-move-from-pentesting-to-ethical-hacking","/news/blog/identifying-vulnerabilities-in-saas-the-guide-updated-for-2023","/news/blog/bug-bounty-vs-pentesting-for-saas-which-one-should-you-choose","/news/blog/navigating-dora-what-every-financial-institution-needs-to-know","/news/blog/from-compliance-to-continuous-security-ethiacks-vision-for-financial-cybersecurity","/news/blog/supercharging-bug-bounty-hunting-with-ai","/news/blog/como-cumprir-com-a-nis2-guia-para-pmes-portuguesas","/news/blog/webinar-cybersecurity-in-supply-chain-start-with-prevention","/news/blog/why-is-soc-2-important-for-startups-a-guide-for-ctos","/news/blog/dont-fear-the-ai-reaper-using-llms-to-hack-better-and-faster","/news/blog/como-fazer-um-inventário-de-ativos-para-cibersegurança","/news/blog/rez0-joins-ethiack-to-advance-ai-offensive-security","/news/blog/risk-assessment-what-is-it-and-how-to-conduct-one","/news/blog/ethiack-culture-we-test-when-we-test","/news/blog/2025-wrap-up","/news/blog/how-to-use-ai-and-automation-for-ethical-hacking-and-vulnerability-assessment"]}