Test and evaluate your WAF before hackers

Test and evaluate your WAF before hackers

Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most common application security technologies available on the market. Since the last century, WAFs have evolved by ...
CTI Process Feedback Loop

6 Essentials for a Near Perfect Cyber Threat Intelligence Framework

Software developers face a constant barrage of cyber threats that can compromise their applications, data, and the security of their organizations. In 2023, the cyber threat The post 6 Essentials for a ...
172

Introducing the Wallarm 2024 API ThreatStatsTM Report

The Wallarm Security Research team is pleased to share the latest version of our API ThreatStats report. This report serves as a key resource for API, Application security practitioners. It emphasizes the ...
657859f194cf500d7cc9eeeb_1280x720-p-800

Webinar: Join us for the latest in API Threats on January 24, 2024

In today's complex digital landscape, the security of APIs has become paramount. As we move into 2024, it's essential to stay ahead of the evolving API security threats and vulnerabilities. The upcoming ...
XML RPC Detection

What is XML-RPC? Benefits, Security Risks, and Detection Techniques

vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the context of the webserver. This may facilitate various attacks The post What is XML-RPC? Benefits, Security Risks, ...
Server-side request forgery

7 Examples of SSRF and How to Protect Yourself from It

It’s unsettling to think that our systems can betray us. With SSRF attacks, harmless-looking web requests turn into weapons for cybercriminals. They can exploit vulnerabilities from The post 7 Examples of SSRF ...
DevOps CI/CD Pipeline

Top 10 CI/CD Security Tools

On the one hand, your sales department is pushing for new features at an alarming rate, forcing you into faster deployment processes. On the other hand, The post Top 10 CI/CD Security ...
AMD processor meme

What is the ‘Zenbleed’ Exploit and 7 Ways to Prevent it Now

In 2018, the discovery of the Meltdown and Spectre CPU vulnerabilities sent shockwaves through the tech industry. These hardware flaws allowed attackers to steal sensitive data The post What is the ‘Zenbleed’ ...

How to plan Web Penetration Testing : A guide in 2023

Introduction Navigating the complex terrain of web penetration testing can be daunting. As an experienced penetration tester specialising in web application security, I can assure you that one of the most valuable ...
The image shows various web application penetration testing tools, such as Burp Suite, Hashcat, Wireshark, NMAP, Nessus, Nuclei and a human brain.

What is Web Application Security Testing?

Web application penetration testing describes the process of simulating an unobtrusive attack against a web application. It allows companies to understand vulnerabilities that are easy to miss during the development process. These ...