Black Box vs Gray Box vs White Box Pentest
Penetration tests often get classified as either “black box pentest”, “white box pentest”, or even “gray box pentest’. However, cutting through the […]
What is a Secure SDLC?
A secure SDLC is a software development lifecycle that includes security at every stage of development from inception to retirement. The goal […]
7 Types of Penetration Testing to Zero in on Vulnerabilities
A penetration test simulates the actions of a hacker in a cyber attack against your computer systems in order to find exploitable […]
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) is a type of injection attack, one of the OWASP 10 vulnerability categories for 2021. In this exploit, an […]
Reflected XSS Cross-Site Scripting
What is Reflected Cross-Site Scripting (XSS)? Reflected Cross-Site Scripting vulnerabilities are a subcategory of XSS vulnerabilities. Reflected XSS attacks occur when an […]
Path Traversal (Directory Traversal) – Definition and Prevention
What is Path Traversal? A path traversal attack (also known as directory traversal) aims to access files and directories that are stored […]
Forced Browsing – Detection and Prevention
What is Forced Browsing? Forced browsing is an attack where the goal is to list and access resources that are not referenced […]
The Ultimate 2022 WordPress Website Security Checklist
WordPress is the world’s most popular and widely used content management system, powering over 40% of all websites. It is also the […]
What is SSL?
Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), are protocols for maintaining a secure internet connection and protecting any […]