Server-side template injection (SSTI) vulnerabilities tend to be less researched than other types of flaws. However, their impact is significant and often leads to remote code execution (RCE). They are therefore flaws that should not be underestimated.

In what contexts do SSTI vulnerabilities occur? How to detect them and how to prevent them?

This is what we will see in this article.

Logistics organisations are confronted to the challenge of relying on new digital solutions without compromising their security.

logistics pentest

Facing a booming market, new technologies have indeed become a real performance lever. But their adoption brings increased cybersecurity risks with them. The concern is now to benefit from the advantages of these tools while protecting their information systems.

This is where a penetration test will help to strengthen the level of security, as it allows to verify the risk set by attackers on a given target. For a logistics company, it will assess the security of web solutions, control software, intelligent sensors, etc. against cyberattacks.

What are the priorities during a penetration test for a company in the logistics sector?

Here is an overview of cybersecurity issues we frequently encounter and that may be specific points of attention.

The security of web applications is a major issue for organisations. SaaS platforms, internal applications, or e-commerce websites, all these systems must be secured to counter the increasing number of attacks targeting all their functionalities and components: servers, APIs, authentication, sessions, access control, third-party components, etc.

Beyond the protection against attacks, security has also become a key factor and a differentiating asset in pre-sales processes, particularly in B2B.

pentest statistics most frequent vulnerabilities

We do pentests every day. (Well, 5 days a week.) Today we’re taking you behind the scenes: we’ve got a closer look at the penetration tests performed in 2020, to share with you some figures on the vulnerabilities found.

We have also identified the three most frequent vulnerabilities found during our pentests and give our insight on the presence of these flaws. Finally, we present some other observations from our penetration tests.

how to prevent email spoofing

Used for phishing and other social engineering attacks, email spoofing is terribly tricky. Well executed, it’s difficult to detect and misleads the recipient.

To counter it, there are technical solutions to put in place when you configure your mail servers. We will see the three essential elements to install to prevent email spoofing: SPF, DKIM and DMARC.

From data breaches to malwares, cybersecurity is in the headlines almost every day and has become a major concern. Especially in the context of the health crisis, cyberattacks are affecting companies of all sizes. How can you prepare for cyberattacks?

We selected some current cybersecurity statistics, in order to know the current trends of threats in 2021. To prepare to face cyberattacks, a pentest is a very effective solution to strengthen your security.

pentest for startups

For many startups, cybersecurity and penetration testing in particular are issues that need to be addressed because of the requests of their customers or investors.

Some startups have a security by design approach and processes that integrate security testing into the software development cycle. Other startups are less mature on the subject, as they do not have in-house security skills. They have questions when it becomes necessary to perform a first pentest.

SaaS & pentest

Security is one of the main concerns of SaaS application publishers. Security is essential for users to trust the solution and to ensure that data is protected.

Authentication security, data compartmentalisation, data encryption, but also user journey security, service continuity and third-party integrations… The security issues of SaaS applications are multiple. A pentest allows you to assess the robustness of a SaaS platform in order to test and strengthen its security level. Here is a list of subjects that deserve special attention during a pentest.