API pentesting is a frequently misunderstood area of application security. Let’s review core concepts of API pentesting and look at how these assessments are performed.
Curious about HIPAA requirements and what it means for your pentest? Let’s review some technical examples of why pentesting in healthcare is so unique.
Black Box, Gray Box, and White Box pentests have pros and cons. Here we lay out all the differences to help you decide which one fits best.
Pentesting on AWS can be difficult. With this guide you can ensure your pentest gets off to a successful start.
Reproducing vulnerabilities from a pentest report is a pain, but with just a few simple tips it doesn’t have to be.
In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.
Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success.
Story of how we managed to find a wormable XSS on Twitter, and how we bypassed Twitter’s CSP policy.