Fabric.io API permission apocalypse – Privilege Escalations

What Is Fabric.io? The Fabric platform is made of three modular kits that address some of the most common and pervasive challenges that all app...

How we tookover shopify accounts with one single click

To keep up with the security companies we often spend some time on bug bounties. That was a very boring weekend till we found...

Increasing Threat Of Ransomware to Online Business

ransomware /ˈrans(ə)mwɛː/ a type of malicious software aimed to hinder access to a computer system until a sum of money is paid. In a ransomware attack, victims...

How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros

How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros How ransomware is ransacking enterprise revenues At the beginning of each year, we are...

Are you doing enough? – Info graphic

WHY A CONVENTIONAL APPLICATION PENETRATION TESTING IS NOT ENOUGH FOR E-COMMERCE APPLICATIONS? E-Commerce applications are growing in complexity, as a result conventional application penetration is...

How to manage and report a corporate data security breach

In recent years, the frequency of data breaches has increased at an alarming rate, as attackers keep finding new paths to penetrate networks and...

A 5–Step Checklist To Securing Your Mobile Apps

The growth of mobile app usage has only been an upward graph in the recent years. But as they say, “With great powers, comes...