Skip to main content

Blog

24.Apr.2018
Nikos Danopoulos, IT Security Consultant
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It might allow attackers to read sensitive information, access configuration files or even execute system commands remotely.
09.Apr.2018
Outpost24 France
Cross Site Scripting, or XSS, is one of the most common type of vulnerabilities in web applications. Discover how to avoid Cross-Site Scripting attacks.
16.Mar.2018
Outpost24 France
Why carry out a cyber security risk assessment? Because company cybersecurity risks are increasing very fast when they haven't smart action plan.
12.Mar.2018
Outpost24
A vulnerability assessment is a risk management process used to identify, quantify and rank possible vulnerabilities to threats in a given system.
20.Feb.2018
Outpost24
Multi-Cloud and Hybrid Cloud are just a click away. The security of its infrastructure should no longer be a barrier in 2018. Get our 7 tips to secure your hybrid Cloud now!
09.Feb.2018
Fernando Gallego, IT Security at Outpost24
In the digital age, web application penetration testing is one of the most critical elements of an organization’s vulnerability management program. In this blog post we will explain the role of penetration testing plays in protecting your organization against web-related exploitations
17.Jan.2018
Simon Roe, Product Manager at Outpost24
In this final blog entry covering OWASP we will address the three new entries, what they mean for organizations and the steps they should take to mitigate the risks they pose.
04.Jan.2018
Srinivasan Jayaraman, Vulnerability Research Manager
CPU bugs Meltdown and Spectre were discovered earlier this week which could allow hackers to read sensitive information stored in a system's memory. Find out what they are and what can be done about these widespread vulnerabilities
02.Jan.2018
Simon Roe, Product Manager at Outpost24
The second part of the OWASP Top 10 2013/17 comparison list with tips and advice to remediate vulnerabilities such as sensitive data exposure, broken access controls, security misconfigurations and cross site scripting (XSS).
21.Dec.2017
Simon Roe, Product Manager at Outpost24
In December 2017 several security researchers discovered that an old vulnerability – namely the Bleichenbachers Oracle Threat had resurfaced after first being discovered 19 years ago in 1989. This recurring vulnerability, now called ROBOT, affects the TLS (Transport Layer Protocol) in a way that could lead to the disclosure of private information caused by discrepancies between valid and invalid PKCS#1 padding.

Looking for anything in particular?

Type your search word here