Introducing: XOR-Based SQL Injection 25/10/17 10:27 Having such an exposure to application related testing means we have seen our share of... READ MORE
Categories Cybersecurity (91) Web Security (77) Website Security (49) Magento (48) PCI, PA-DSS and P2PE (43) Forensics and Incident Response (40) Malware (22) Penetration Testing (22) Foregenix (18) eCommerce (18) Indicators of compromise (17) Hack (16) News (15) Vulnerability (15) GDPR (13) Compliance (9) Web Scan (9) Fraud (7) Encryption (5) Travel Agents (4) WAF (4) Insider (3) JavaScript (3) SSF (3) Cryptocurrency (2) DFIR (2) Ransomware (2) Serengeti (2) Blockchain (1) Firewall (1) SWIFT (1) The Queens Awards (1) SEE ALL
Getting The Most Out Of Your Web Application Penetration Test 08/09/17 15:45 The purpose of this post is to help clients better prepare, digest and act upon the results of a... READ MORE
Penetration Testing: The Quest For Fully UnDetectable Malware 05/07/17 10:57 Malware continues to be one of the main attack vectors used by criminals to compromise user and... READ MORE