From Local File Inclusion to Remote Code Execution –...
Application Security
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It...
credentials theft.
Credential theft: the business impact of stolen credentials
Research & Threat Intel
Cybercriminals are stealing credentials using a wide range of techniques, tactics and procedures. The compromised data has a variety of...
From Local File Inclusion to Remote Code Execution –...
Application Security
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It...
What to expect from a web application penetration test
Application Security
In the digital age, web application penetration testing is one of the most critical elements of an organization’s vulnerability management...
Visualisation of attack surface
Attack Surface 101: How well do you know your...
EASM
By now, the term digital footprint shouldn’t be a mystery anymore. We roll our eyes every time we see an...