7 Questions to Ask Yourself Before Doing a Penetration Test Security is essential, and you agree with that. You want indeed to do a penetration test (or pentest) on your solution soon… Here are 7 question... 02.05 Applications
Recon Audit: Which Information About Your Company Can Be Found Online? “All the success of an operation lies in its preparation”, Sun Tzu. Already true in the 6th century BC, this maxim remains true in the 21st century. A... 11.04 Applications
GDPR: Technical Security Measures Updated Dec 1. 2020 More than 2 years after the GDPR came into force (May 25, 2018), sanctions have been pronounced by several data protection authori... 13.03 Applications
How to Assess Security Flaws Risk? After a security audit, you have been notified flaws. Critical, important, medium: do you know how this is assessed? We describe here our methodology,... 27.02 Applications
Phishing: How to identify suspicious emails? Phishing evolved a lot. Whereas fraudulent email was before easily detected by its obvious spelling mistakes and its exaggerated request or threats (i... 13.02 Phishing & Social Engineering
User enumerations on web applications During our audits, we often encounter user enumerations that could be easily avoided with the right methods. In this article, we will discuss user enu... 15.09 Applications
Exploiting google dorks to strengthen your security [Article updated on November 8, 2022] Have you used google dorks today? If you have searched for a word within quotes or combined two terms with AND, ... 10.01 Applications
Mobile application security explained simply – Episode #3 This series of articles will walk you through the most important topics about security and mobile applications, whatever the platform is (iOS, Android... 23.03 Applications
Mobile application security explained simply – Episode #2 This series of articles will walk you through the most important topics about security and mobile applications, whatever the platform is (iOS, Android... 03.03 Applications
Mobile application security explained simply – Episode #1 This series of articles will walk you through the most important topics about security and mobile applications, whatever the platform is (iOS, Android... 26.02 Applications
Why should you conduct outsourced penetration testing on your apps? Do you usually conduct application testing before releasing? In this article you will find out why conducting outsourced penetration testing can stron... 16.09 Applications
How to Protect Your Website : PHP Security Tips and Tricks #3 Updated: 23 Dec. 2020 This article does not replace a good knowledge of security principles in PHP, but can give you some good advices that really boo... 26.08 Applications