Basic Pentesting: 2 — CTF Walkthrough

Basic Pentesting: 2 — CTF Walkthrough

| | Penetration Testing
In this article, we will try to solve another Capture the Flag (CTF) challenge. This CTF was posted on VulnHub by Hadi Mene and is part of a Basic Pentesting series. According ...
Are Application Testing Tools Still Relevant with Self Learning WAFs?

Are Application Testing Tools Still Relevant with Self Learning WAFs?

We all want to secure our applications. This task is becoming harder by the day as our applications constantly change multiple times per week, if not per day. According to Radware’s Web ...

Finding Your Weakness: Triaging Your Domains with SWAT

I have been involved in IT and security in one way or another for almost 30 years. I have worked full time for organizations and consulted in a wide variety of jobs ...
An example of a successful account takeover attack using Hydra, a credential stuffing tool

Watch: An Account Takeover Attack Using Credential Stuffing, and How to Protect Against It [Video]

As cryptocurrencies continue to grow in diversity, so too do the threats they face, specifically those targeting the cryptocurrency exchange. Now, more than ever, cryptocurrency exchanges are facing security threats in the ...
self-service password resets

G Suite™ Self-Service Password Resets

G Suite™ is one of the most popular productivity solutions for business users. Originally going by the name Google Apps, it arrived on the scene roughly a decade ago. It was brought ...
Dealing with Overlay Attacks: Adopting Built-in Security To Safeguard Mobile Experience

Dealing with Overlay Attacks: Adopting Built-in Security To Safeguard Mobile Experience

The growth of mobile technology and the increased importance of cybersecurity have dominated news cycles in the past year. At the same time, one of the biggest threats we’re seeing against mobile ...
Industrial Control Gateways

Industrial Control Gateways: It’s Like Exploiting in the 1990s

Industrial control gateways play a critical role in industrial infrastructure, linking systems and sensors that communicate using protocols such as Modbus or serial to IP networks for easier remote management and monitoring ...
Security Boulevard
Security Boulevard’s 5 Most Read Stories for the Week

Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, ...
Security Boulevard

Enhanced Infrastructure DDoS Protection Analytics: Targeted Visibility for Greater Accuracy

We’ve rolled out enhanced infrastructure protection analytics which shows top traffic patterns for traffic flowing through our Incapsula Infrastructure DDoS Protection service. Imperva clients can now view network statistics categorized by source ...
Maximizing the impact of static analysis

Maximizing the impact of static analysis

This is the first post in a three-part series on how you can maximize the impact of a static analysis solution by supporting developers and their goals. Aligning static analysis with development ...
Loading...