Collection #1: The ‘largest’ data breach ever discovered
Over the years, many sizeable well-known household name companies have fallen victim to cyber attackers, including many large players that you may not have heard
Over the years, many sizeable well-known household name companies have fallen victim to cyber attackers, including many large players that you may not have heard
Today we take a look at some of the most significant cybersecurity incidents of 2020, their impact, and the steps your organisation can take to
Insufficient logging and monitoring is number ten on OWASP’s list of most critical web application and internet security risks. OWASP states that insufficient logging and
Of all the cybersecurity weaknesses, using components with known vulnerabilities is perhaps the easiest to understand. Although this weakness is widespread, it is somewhat easy
Ransomware is a severe cybersecurity threat that results in significant damage and costs. Here we take a look at what ransomware is and answer the
Polish video game maker CD Projekt confirmed that they were victims of a targeted cyber attack, compromising internal systems. The company, which is known for
Continuing our series of articles helping business leaders understand cybersecurity threats, we take a look at insecure deserialisation. What is insecure deserialisation? According to OWASP:
Today we take a look at cross-site scripting, explaining what it is, the dangers it presents, and how to find and test for vulnerabilities, all
Continuing our series of articles for business owners, aimed at explaining the cyber risks and remedies in simple and understandable language, we look at security
With most of the vulnerabilities we have explored so far, we have taken the time to learn about the feature being exploited. This article will
To understand XML external entity injection, also known as XXE, we first need to understand exactly what XML data is. What is XML data?
What is sensitive data exposure? Sensitive data exposure is a type of cybersecurity vulnerability that affects many web applications. These occur when a company inadvertently
Obscurity for security is the art of storing important information in such a way that only you would know where or how to find it.
Many aspects of software development and penetration testing can be complex to understand for business owners. This is why we are embarking on a journey
Password autofill is a service that you have probably been using for years without thinking much about it. Nothing is more convenient than visiting a website and the browser automatically putting your username, password, or form data in the required fields.