blog search

PurpleBox Blog

article search

Introduction to Burp Suite’s Latest Extension DOM-Invader

Learn about the Burp Suite 2021.7 release and the DOM Invader extension features. Explore the new features by our tutorial demo..

Read More

The Ultimate Guide to SQL Injection [AppSec Blog Series Part 4]

Learn about SQL Injection and explore the types of SQLi. Explore real-life SQL Injection attack...

Read More

What Awaits Us with the PCI DSS 4.0 Timeline Release?

Explore the most controversial changes proposed in the PCI DSS V4.0 Timeline Release. Ensure th...

Read More

Multi-Tenant Architectures with AWS Cognito

Learn how to build multi-tenant applications usig AWS Cognito. Discover authentication and aut...

Read More

A Closer Look at OWASP Top 10 Security Risks & Vulnerabilities [AppSec Blog Series Part 3]

Learn what OWASP Top 10 consists of and examine each item of OWASP Top 10 2017 list in detail. ...

Read More

The Best User Management Service: AWS Cognito

Discover how to provide user management with AWS Cognito User Pool and access control to web an...

Read More

How to Create Web Apps with AWS Serverless Microservice Patterns [Part 2]

Discover how to create a GraphQL API and use it in front-end React apps. Learn how to set up th...

Read More

What is OWASP? [AppSec Blog Series 2]

Learn everything you are wondering about OWASP! What is it used for? What are OWASP Top 10 and ...

Read More

AWS Security Services Overview

Discover the broad range of services Amazon Web Services (AWS) offers its customers and learn h...

Read More

Installation Guide for Qualys Sensor in AWS ECS Cluster

Use our installation guide to deploy Qualys Container Sensor in AWS ECS Cluster step by step.

Read More