Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Reversing a binary using GDB: tutorial for Reverse Engineers

Reversing binaries is an essential skill if you want to pursue a career as exploit developer, reverse engineer or programming. The GNU Project debugger is a widely used debugger for debugging C and C++ applications on UNIX systems. A debugger is a developer's best friend to figure out software bugs and issues. This tutorial intends to be beneficial to all developers who want to create reliable and fault-free software.

What is OWASP Mobile Security Testing Guide (MSTG)?

With millions of apps being released every day and ever-changing feature additions, it is more important than ever for enterprises to focus on security to prevent data breaches. According to Checkpoint, in 2020, 97 per cent of enterprises were confronted with mobile threats employing a variety of attack vectors. What is Mobile Security Testing Guide (MSTG)? The MSTG is a comprehensive manual for mobile app security testing.

JavaScript type confusion: Bypassed input validation (and how to remediate)

In a previous blog post, we showed how type manipulation (or type confusion) can be used to escape template sandboxes, leading to cross-site scripting (XSS) or code injection vulnerabilities. One of the main goals for this research was to explore (in the JavaScript ecosystem) how and if it is possible to bypass some security fixes or input validations with a type confusion attack (i.e by providing an unexpected input type).

How and when to use Docker labels / OCI container annotations

Most container images are built using Dockerfiles which contain combinations of instructions like FROM, RUN, COPY, ENTRYPOINT, etc. to build the layers of an OCI-compliant image. One instruction that is used surprisingly rarely, though, is LABEL. In this post, we’ll dig into labels (“annotations” in the OCI Image Specification) what they are, some standardized uses as well as some practices you can use to enhance your container security posture.

How to Block Specific Websites & Allow Access to Only Certain Sites

Want to block a website from being accessed in your organization? Whether you are a school, library, or business you need software to block internet access if you want to prevent your users from visiting high-risk, inappropriate, and distracting websites. In this article you will learn about the many ways you can control internet use on Windows computers using BrowseControl, CurrentWare’s internet and app blocking software.

How to Harden Your Cloud Environment in 5 Steps

In recent years, with the rapid rise of cloud computing, the virtualization of applications and infrastructure has been replacing traditional in-house deployments of applications and services. It’s currently more cost-effective for organizations to rent hardware resources from companies like Microsoft, Amazon, and Google and spin up virtual instances of servers with the exact hardware profiles required to run their services.

Change and Configuration Management Best Practices Guide

Systems are constantly changing. Change and configuration management best practices allow organizations to keep track of configuration changes in a way that allows for rapid feature updates without any service outages, but many organizations struggle to find the ideal formula to make this process successful. So, what are the best practices in change and configuration management?

Which File Integrity Monitoring Technology is Best for FIM? File Integrity Monitoring FIM or SIEM FIM?

Within the FIM technology market, there are choices to be made. Agent-based or agentless is the most common choice, but even then there are both SIEM and ‘pure-play’ FIM, solutions to choose between.