CSRF attacks: principles, impacts, exploitations and security best practices CSRF attacks are often used to compromise the data and features of a web application. Principles, impacts, possible exploitations, we present in this ... 28.06 Applications
How to increase risk awareness to prevent social engineering attacks? Over the years, social engineering attacks have become a reality for all companies, regardless of their sector of activity or size. Beyond the technic... 06.05 Phishing & Social Engineering
How to secure an internal network? Network security is a major challenge for companies. Indeed, the growing importance of IT assets, the interconnection of information systems and their... 25.04 Infra & Network
How to strengthen the security of your APIs to counter the most common attacks? APIs are everywhere. In most IT systems (mobile applications, web platforms, cloud infrastructures, etc.) and in all sectors of activity, these progra... 20.04 Applications
Node.js: Common vulnerabilities and security best practices Another article on Node.js security? But in this one, we focus on the most common vulnerabilities encountered during penetration testing. Node related... 22.03 Applications
RCE vulnerability in a file name During our security audits, we are regularly confronted with vulnerabilities that allow commands to be executed on a system. These can take various fo... 17.03 Applications
How to secure a website? The security of websites (e-commerce websites, corporate websites, SaaS platforms and other web applications) is a major issue for companies. Being ex... 25.02 Applications
Understanding and preventing the path traversal vulnerability In which cases can a path traversal vulnerability occur? How to detect this flaw and protect yourself from it? This is what we will detail in this art... 28.01 Applications
Server-Side Template Injection vulnerability: what it is and how to prevent it Server-side template injection (SSTI) vulnerabilities tend to be less researched than other types of flaws. However, their impact is significant and o... 29.12 Applications
Logistics companies security: what are the challenges and priorities during a penetration test? Logistics organisations are confronted to the challenge of relying on new digital solutions without compromising their security. Facing a booming mark... 02.11 Applications
Should you provide access to source code during a web application pentest? Providing access to the source code during a pentest has mainly advantages or disadvantages, depending on the point of view! Here is our feedback, whi... 26.10 Applications
How to secure authentication, session management and access control systems of your web applications? The security of web applications is a major issue for organisations. SaaS platforms, internal applications, or e-commerce websites, all these systems ... 05.10 Applications