Our team researches and documents bleeding-edge security concepts and hacking techniques.
This blog explores these topics and more to keep you informed.
Evaluating AppSec Solutions for SaaS: What You Need to Know Before Deciding
Introduction Given that most online security incidents are caused by human error, it's evident that protecting your platform requires more than advanced technology; it demands effective strategies that your entire team can implement. This guide ...
Agile Security: Incorporating Strong Security Practices in SaaS Development Cycles
Introduction As a SaaS founder, you face the constant challenge of developing fast while keeping your applications secure. Balancing speed and security is tough but essential in today's tech landscape. This article dives into Agile ...
The SaaS Developer’s Security Checklist for 2024
Introduction Let's face it, the security demands on SaaS platforms in 2024 are intense. You’re right in the thick of it, trying to ensure your application is as secure as possible. This guide is designed ...
Understanding IDOR Attacks: How Insecure Direct Object References Threaten Application Security
What is an IDOR attack? An insecure direct object reference (IDOR) is a type of vulnerability that occurs when a threat actor is able to gain access to unauthorized objects by manipulating identifiers within areas ...
SaaS Security Fundamentals: Building a Strong Security Posture for Your SaaS Application
Introduction Have you ever wondered how the top Software as a Service (SaaS) platforms keep their data safe? This article will explore the core concepts of securing SaaS applications. It's packed with essential tips and ...
Learning About SSL/TLS Certificates – Part 1
The Beginning: If you were around for the early days of the internet, you can remember the awe of navigating through dozens of websites and chatrooms. Getting recommended new sites from friends you just made ...
Common Mistakes SaaS Businesses Make With Application Security
Introduction Is your SaaS platform's security armor full of chinks you've yet to discover? As we explore the essential role of application security in the SaaS sector, this article will cover why regular security audits ...
Privilege Escalation on macOS: Leveraging Common Techniques
Introduction I am a firm believer that given enough time and resources, vulnerabilities can be found in any platform. Sometimes they are hard, sometimes they are easy, but they are there. ...
Network Poisoning Scanner with Trafficscan.py
Anyone that has ever had to deal with an internal network penetration test knows the big 3 of network poisoning attacks. Those are Link Local Multicast Name Resolution (LLMNR), Network Basic Input/Output System (NetBios), ...