Pentesting on AWS can be difficult. With this guide you can ensure your pentest gets off to a successful start.
Reproducing vulnerabilities from a pentest report is a pain, but with just a few simple tips it doesn’t have to be.
In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.
Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success.
This is a tale of how we found a wormable XSS on Twitter, and how we managed to fully bypass its CSP policy.