Custom JWT Generation for Cloud Solutions
What is JWT, JWT use cases, why do we need custom JWT? In this blog post we give you details about custom JWT generation for your AWS Cloud solution and different JWT attacking tools that could be useful for your pentest processes.
What is Apache Log4J Vulnerability and How to Prevent It?
Apache Log4j is a Java-based logging utility. Log4j Java library’s role is to log information that helps applications run smoothly, determine what’s happening, and help with the debugging process when errors occur.
What is a Web Application Firewall?
A Web Application Firewall, or WAF, is a barricade within client and server that monitors, filters, sanitizes or blocks malicious requests to the web application.
The Ultimate Guide for Broken Authentication
Authentication is the process of verifying the identity of an individual, an entity, or a website. Broken Authentication is a significant threat for Web Application Security."
The Ultimate Guide for Cloud Penetration Testing
Cloud penetration testing is an attack simulation performed to find vulnerabilities that can be exploited, or to find any misconfigurations in a cloud-based system.
A Complete Guide To Server-Side Request Forgery (SSRF)
In a Server-Side Request Forgery (SSRF) attack, the attacker can read or update internal resources. Explore how to exploit SSRF with example cases.
What is Cloud Security?
Cloud security focuses on protecting cloud-based data from cyber threats. Find information and example cases about cloud security.
Welcome SSRF! Take a Look at the New Member of OWASP Top 10!
Server-Side Request Forgery (SSRF) attack is a type of attack that the attacker can abuse functionality on the server. Meet this new member of OWASP Top 10.
What is Pentest? | Penetration Testing Definition and Methods
Pentest (Penetration Test) is a controlled cyberattack that helps check for exploitable vulnerabilities. Explore the execution of a pentest service.