AWS Penetration Testing: Essential Guidance for 2021

AWS Penetration Testing: Essential Guidance for 2021

| | application
Pentesting on AWS can be difficult. With this guide you can ensure your pentest gets off to a successful start. The post AWS Penetration Testing: Essential Guidance for 2021 appeared first on ...
Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

| | application
Reproducing the vulnerabilities documented in a pentest report is a common engineering pain point. But aligning developer skills with the tooling used during the pentest can help confirm issues faster, and deploy ...
Balbix DNS cyberresilience remote

Tips From a Hacker to Keep Smartphones Safe

We can do many things using our mobile devices: hail a taxi, book a hotel, send and receive money, purchase goods online or in-store, chat and share media files, control other devices ...
Security Boulevard
Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird User

Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird User

| | application
In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters. The post Pentesting User Interfaces: How to Phish Any Chrome, Outlook, ...
5 Tips for selecting a penetration testing company in 2020

5 Tips for selecting a penetration testing company in 2020

| | application
Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success. The post 5 Tips for selecting ...

Moving Fast Without API Guardrails?

In 1999, Bruce Schneir wrote, “complexity is the worst enemy of security.” Today, I’d argue that speed may be overtaking that top spot or coming darned close. There were two stories published ...
Who installs Zoom apps outside the Play Store? Well, lots of people.

Who installs Zoom apps outside the Play Store? Well, lots of people.

Video conferencing platform use has skyrocketed as people turn to remote work and e-learning, and Zoom has witnessed a tremendous surge in popularity. This popularity, though, has brought increased scrutiny that has ...

Advancing Application Delivery

Are you in an organization implementing Continuous Delivery? Are you a manager who wants to see your applications respond at the pace of the market - or better, be in front of ...
Tale of a Wormable Twitter XSS

Tale of a Wormable Twitter XSS

| | application
This is a tale of how we found a wormable XSS on Twitter, and how we managed to fully bypass their CSP policy. The post Tale of a Wormable Twitter XSS appeared ...

Penetration Testing for the Cloud – How it is different?

If you are working in the cyber security industry, you will be familiar with terms like application penetration testing, network.. The post Penetration Testing for the Cloud – How it is different? ...