attack surface EASM
Security through obscurity: An illusion of safety? 
Application Security
Security through obscurity is based on the idea that if attackers don’t know how a system works or even if...
white text on blue background visualizing the overwhelming amount of data in pen testing that can lead to false positives
How to reduce false positives when pen testing web...
Application Security
In the context of penetration (pen) testing, false positives are where the testing tools or methods identify a security vulnerability...
Outpost24’s Capture the Flag event recap: “json returns”
Application Security
On the crisp morning of December 13th, 2024, as the clock struck 09:59 CET, anticipation filled the air. Around the...
press release
Five strategies for uncovering vulnerabilities in web applications
Application Security
I’ve been working as an Application Security Auditor in Oupost24’s web application security testing team for almost three years now....
press release
Exploiting trust: Weaponizing permissive CORS configurations
Application Security
If you’re a pentester, or a consumer of application security pentest reports, you’ll probably have come across Cross-Origin Resource Sharing...