LATEST ARTICLES

XSS by tossing cookies

All cross site scripting vulnerabilities cannot be exploited easily and would need a vulnerablity chain to exploit them For example a self XSS that...

Fabric.io API permission apocalypse – Privilege Escalations

What Is Fabric.io? The Fabric platform is made of three modular kits that address some of the most common and pervasive challenges that all app...

How we tookover shopify accounts with one single click

To keep up with the security companies we often spend some time on bug bounties. That was a very boring weekend till we found...

Increasing Threat Of Ransomware to Online Business

ransomware /ˈrans(ə)mwɛː/ a type of malicious software aimed to hinder access to a computer system until a sum of money is paid. In a ransomware attack, victims...

How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros

How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros How ransomware is ransacking enterprise revenues At the beginning of each year, we are...

Are you doing enough? – Info graphic

WHY A CONVENTIONAL APPLICATION PENETRATION TESTING IS NOT ENOUGH FOR E-COMMERCE APPLICATIONS? E-Commerce applications are growing in complexity, as a result conventional application penetration is...

How to manage and report a corporate data security breach

In recent years, the frequency of data breaches has increased at an alarming rate, as attackers keep finding new paths to penetrate networks and...