traditional pen testing
Can traditional pen testing keep up with modern AppSec?...
Application Security
A pen tester’s perspective on the most common issues with vulnerability scanning and traditional pen testing of modern web apps.
broken-access
Broken access control vulnerabilities and why scanners can’t detect...
Application Security
Examples of broken access control vulnerabilities and why they remain present even after vulnerability scans and assessments.
HTTP request smuggling
Using HTTP request smuggling to hijack a user’s session...
Application Security
In this blog, one of our Application Security Auditors takes a look at the new HTTP request vulnerability, gives a...
Penetration testing vs vulnerability scanning: What’s the difference?
Application Security
Vulnerability scanning and penetration testing should be an essential part of your cybersecurity strategy. This blog discusses the above methods...
Account takeover vulnerability in Azure’s API Management Developer Portal
Application Security
How an Account Takeover vulnerability, discovered during a routine customer engagement, became a candidate for responsible disclosure, via the Microsoft...