Secure Web Development Part 1: Common Mistakes

Secure Web Development Part 1: Common Mistakes

Web development is a dynamic landscape that’s constantly evolving with new technologies, trends, and security threats. Unfortunately, the crucial aspect of web security is often overlooked. There are many reasons for this, and they vary from team to team and...
Save Time During your Next Pentest

Save Time During your Next Pentest

Pentesting is inherently time-consuming. This constraint alone has led to the rise of scanners as well as the exclusion of regular pentesting in many modern development lifecycles. Whilst we can’t automate and deliver everything at lightspeed, there are things we can...
Clickjacking 101: What is Clickjacking and How Does it Work?

Clickjacking 101: What is Clickjacking and How Does it Work?

Clickjacking, also known as UI Redressing, is a technique that tricks users into clicking on unintended elements on a website. By using hidden elements, attackers deceive users into performing actions that they did not intend to carry out. Learn more about...
What is Cross-Site Scripting (XSS)?

What is Cross-Site Scripting (XSS)?

Overview Cross-Site Scripting (XSS) is a type of security vulnerability in web applications that enables an attacker to insert malicious code into a web page that can be viewed by other users (typically in the form of scripts). When a web application fails to properly...
What is Threat Modeling and Why You Should Use it

What is Threat Modeling and Why You Should Use it

Threat modeling is a process used to identify potential threats and weaknesses in a system. It involves breaking down a system and examining it to better understand what needs protecting, who might attack it, and how it can be protected. So who needs to be involved?...
How to Get Started with Code Review

How to Get Started with Code Review

Code review is an essential part of the web application penetration testing process but is often overlooked. We’re going to look at why it’s important and how to get started. There are a number of reasons why we might decide to review the source code of an application...