Application Security

Application Security

10 Percent of iOS Apps Have a Data Compromising Vulnerability

10 Percent of iOS Apps Have a Data Compromising Vulnerability

A common programming error exposes almost 10 percent of iOS apps to attacks that can result in their data being wiped or malicious code being executed in their sandbox. The vulnerability was ...
Security Boulevard
Escaping the Whale: Things you probably shouldn’t do with Docker (Part 1)

Escaping the Whale: Things you probably shouldn’t do with Docker (Part 1)

In this blog post, I won’t spend too much time explaining what Docker is and is not. You can do some research on your own if you want to learn more about ...
 Well, this time its not a RAM issue, it's much worse...

Google’s Litany of Chrome Fail: Malicious Extensions Burgeon Out of Control

Well, this time its not a RAM issue, it's much worse... via Martin Brinkmann, writing at Ghacks, tells us of the shameful track record of Google Inc. aka Alphabet Inc. (Nasdaq: GOOG) ...

The Ultimate Guide to Ethical Hacking

Penetration testing and ethical hacking are often used interchangeably when people talk about networking and cybersecurity. Currently, the demand for cybersecurity professionals such as ethical... Go on to the site to read ...
DEF CON 23 - Ricky Lawshae - Let's Talk About SOAP Baby, Let's Talk About UPNP

New DDoS Attack Method Demands a Fresh Approach to Amplification Assault Mitigation

Amplification attack vectors are some of the most commonly used tools in the DDoS attacker’s arsenal. In the last quarter of 2017, we saw NTP amplification employed in roughly 33 percent of ...
Open Banking APIs under PSD2: How to Mitigate Risk

Open Banking APIs under PSD2: How to Mitigate Risk

This blog was inspired by an article by Frederik Mennes that first appeared on Techzine. In recent years, open banking has received a lot of attention in the financial services sector. Open ...
Threat Hunting – Zyklon Trojan

Threat Hunting – Zyklon Trojan

This is a lab that is conducted in a test bed. The resources were downloaded from malware.trafficanalysis.net. The samples provided came from a case study of a specially crafted pcap file from ...
Imperva Python SDK – We’re All Consenting SecOps Here

Imperva Python SDK – We’re All Consenting SecOps Here

Managing your WAF can be a complicated task. Custom policies, signatures, application profiles, gateway plugins… there’s a good reason ours is considered the best in the world. Back when security teams were ...

Top 10 Solutions to Protect Against DDoS Attacks and Increase Security

According to statistics, 33% of businesses fall victim to DDoS attacks. It is almost impossible to predict such attacks. Some of them can be powerful and reach 1.35 TBps. According to Incapsula, ...
Want to See What A Live DDoS Attack Looks Like?

Want to See What A Live DDoS Attack Looks Like?

We’re fortunate enough to have had Andy Shoemaker, founder of NimbusDDoS, and our own Ofer Gayer chat about DDoS attacks and shed some light on the gaps in many people’s understanding of ...
Loading...