What is Command Injection? Exploitations and Security Best Practices Command injections are one of the most critical vulnerabilities in web security. They occur when an attacker manages to execute arbitrary system comma... 13.09 Applications
What is Pre-Account Takeover? Exploitations & Security Tips Pre-Account Takeover is a type of attack that we very often carry out during our audits. Although it is only possible in very specific situations, the... 12.09 Applications
What is RFI? Remote File Inclusion Exploitations and Security Tips Security vulnerabilities are a major risk for modern web applications, potentially exposing sensitive user data and corporate infrastructures to malic... 03.09 Applications
Exploring Email Change Vulnerabilities and Security Best Practices Whatever the web application, it is common practice to allow users to change their email address. This functionality is critical because it has a dire... 23.08 Applications
What are IoT Attack Vectors and Security Challenges? IoT security is a key issue for organisations. In all sectors and areas of activity (healthcare, industry, services, transport, energy, etc.), the IoT... 06.08 IoT
Security Audits: Objectives, Types and Methodologies With cyberattacks on the rise, carrying out an IT security audit has never been a higher priority for businesses. Web applications, mobile apps, APIs,... 06.08 Applications
What is Prototype Pollution? Exploitations and Security Tips Prototype pollution vulnerabilities are specific to JavaScript. They can be exploited on both the server and client sides. These vulnerabilities allow... 06.08 Applications
Phishing: Methodology, Common Techniques and Tools We can’t talk about social engineering without mentioning phishing. Similarly, email is essential when it comes to phishing. Although there are ... 05.08 Phishing & Social Engineering
Account Takeover Techniques and Security Best Practices Account takeover is a common practice that threatens the security of users and their data. The impact on victims depends on the type of account target... 22.07 Applications
SAML: How it Works, Vulnerabilities and Common Attacks Secure identity and access management has become a key challenge for organisations. Among the solutions available, Security Assertion Markup Language ... 19.07 Applications