A Complete Guide To Server-Side Request Forgery (SSRF)
In a Server-Side Request Forgery (SSRF) attack, the attacker can read or update internal resources. Explore how to exploit SSRF with example cases.
What is Cloud Security?
Cloud security focuses on protecting cloud-based data from cyber threats. Find information and example cases about cloud security.
Welcome SSRF! Take a Look at the New Member of OWASP Top 10!
Server-Side Request Forgery (SSRF) attack is a type of attack that the attacker can abuse functionality on the server. Meet this new member of OWASP Top 10.
What is Pentest? | Penetration Testing Definition and Methods
Pentest (Penetration Test) is a controlled cyberattack that helps check for exploitable vulnerabilities. Explore the execution of a pentest service.
PM and EDR Remediation Demonstration
Explore how to patch using Qualys PM and remediate the target host with Qualys EDR modules. Find out how to send an email with EDR for a response action alert
Qualys Endpoint Detection and Response (EDR)
Learn about Endpoint Detection and Response (EDR) essentials and its benefits. Follow the Qualys EDR guide for step by step configuration.
Qualys Patch Management (PM)
Need a guide for Qualys PM? Explore the Qualys PM application, assets and patches. Follow the PM Activation & Setup steps and learn about the PM Deployment job.
AWS IAM for Red and Blue Teams
Learn how you can securely manage access to AWS services and resources. See AWS IAM from two perspectives = Red Team vs. Blue Team.
A Comprehensive Guide to Broken Access Control
Gain a better understanding of broken access control, related vulnerabilities, and security risks. Explore some real-world scenarios of broken access control.
We offer 360° Security protection for your business with our trusted experts in cybersecurity.
PurpleBox, Inc. Atlanta, GA firstname.lastname@example.org