Are your Corporate Data and Sensitive Documents on the Dark Web? From a cybersecurity point of view, the dark web is like a huge marketplace where sensitive data (personal data, bank details, email addresses, creden... 12.04 Applications
Security of e-commerce websites: what are the priorities for a pentest? Regularly carrying out penetration tests on e-commerce websites ensures a good level of security. This is necessary to ensure the proper functioning o... 30.03 Applications
How to Strengthen the Security of Your Network Infrastructure to counter the Most Common Attacks? The network infrastructure is at the core of business operations in most industries. It can be considered the nerve centre of the entire IT organisati... 12.03 Infra & Network
How to Strengthen the Security of Your Web Applications to Counter the Most Common Attacks? Most web applications manipulate personal and/or business data, in other words, sensitive data. Passwords, email addresses, credit card numbers, healt... 01.02 Applications
Cloud Security: Risks and Best Practices Do you know this half-joke, ‘there is no cloud, it’s just someone else’s computer’? Cloud computing is often seen as THE solution, so it is often... 26.01 Cloud
9 Misconceptions about Web and Mobile Applications Security Web and mobile applications are at the core of most companies’ activities. Whether you’ve already deployed them or that they are still und... 09.12 Applications
Black, Grey or White Box Penetration Test? 3 Options for a Security Audit During a security audit, 3 approaches are possible. They reflect different levels of information and access given to pentesters. The choice of th... 03.11 Applications
Cybersecurity: What Risks if your Website is Based on a CMS? WordPress, Joomla, Drupal, Shopify and many more, offer real possibilities for creating sites that are both ergonomic and efficient. However, a negati... 20.10 Applications
Phishing Analysis: 8 Psychological Drivers Do you know why phishing is so dangerous? Because it combines IT skills with knowledge of human psychology. In fact, a phishing email relies on human ... 08.10 Phishing & Social Engineering
How To Define The Scope Of A Pentest? Defining the scope of a penetration test is a delicate step. What will be the target of the pentest? More precisely, which functional and technical as... 17.09 Applications
Pancake Hardcoded Secret Leads to Account Takeover – Vaadata Advisory TL;DR Pancake is an online invoicing, project management, time tracking and proposal software. A shared hardcoded secret used to sign the session cook... 08.09 Applications
Understanding web vulnerabilities in 5 min – Episode #11 – XXE An XXE (XML External Entities) is a vulnerability ranked in the Top 10 OWASP and affecting programs interpreting XML. Its main characteristic is the a... 25.08 Applications