Application Mobile Network
Application

AWS Penetration Testing: Essential Guidance for 2021

Pentesting on AWS can be difficult. With this guide you can ensure your pentest gets off to a successful start.

Application

Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

Reproducing vulnerabilities from a pentest report is a pain, but with just a few simple tips it doesn’t have to be.

Application

Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird User

In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.

Application

5 Tips for selecting a penetration testing company in 2020

Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success.

Application

Tale of a Wormable Twitter XSS

This is a tale of how we found a wormable XSS on Twitter, and how we managed to fully bypass its CSP policy.

Application

The jQuery Security Model Explained

jQuery is a JavaScript UI framework which provides an abstraction layer to many DOM manipulation functions.