Archive for author: admin


Why Security Testing is Important? It’s Tools & techniques

What’s security testing? The system is all about looking for all the probable loopholes and flaws of this system. These threats may lead to a security breach. It protects the fact your systems are free of...


General Data Protection Regulation (GDPR)

What is GDPR? GDPR represents the General Data Protection Regulation. GDPR is a regulation in EU law on data protection and security in the European Union and the European Economic Area. It additionally addres...

Brief Introduction On Devsecops

Overview of DevSecOps The DevSecOps approach coordinates Development and Operations with Security Operations, embedding security rehearses into the product improvement and tasks lifecycle. The objective of the ...

Top US Travel Site Secured From IDOR Vulnerability Before Exploitation

Top US Travel Site Secured From IDOR Vulnerability Before Exploitation

Databases often hold the backbone of an organization; its’ transactions, customers, employee info. It should be of no surprise that company databases are the high-value target for cybercriminals. Recently apptr...

Critical/High Severity Vulnerabilities

Cross-Site Scripting Vulnerability Leads To Critical Takeover For Banking Platform

To catch a hacker, you must think like a hacker. An attacker looks for ways to chain together multiple exploits into one large attack. What is often missed in this type of scenario is what happens when vulnerab...

Businessmen trading stocks online. Stock brokers looking at graphs, indexes and numbers on multiple computer screens. Colleagues in discussion in traders office. Business success concept.
News & Events

Critical/High Severity Vulnerabilities Found In $1B Fintech Company

One of our clients is a leading developer of software applications for brokerages, banks, and electronic trading exchanges. They thoroughly test their applications and use numerous “defense-in-depth” security t...

Low Severity Vulnerabilities

OK To Defer Low Severity Vulnerabilities?

Not if a black hat hacker can chain multiple low severity vulnerabilities together to create a critical/high severity vulnerability! We’ve seen several instances of this tactic with our customers recently Simp...

Static/Dynamic Testing

Does Static/Dynamic Testing Identify All App Vulnerabilities?

In a word, No. There are certain vulnerabilities can only be identified with manual app testing, such as Authentication Bypass, Password Management & Privilege Escalation, logout functionality and token han...

red team pen testing

Run More Frequent Pen Tests Economically

Running full penetration tests is expensive because it’s labour intensive. Unlike malware or vulnerability testing which can be mostly automated, penetration tests are mostly manual and are performed by very sk...

automated vulnerability testing

Is automated vulnerability testing enough?

It wasn’t enough for Equifax.  In today’s cybersecurity environment, you’ve got to think like a black hat hacker and protect your infrastructure from the techniques used not just the vulnerabilities themselves....