Why Authentication Needs to Evolve In today’s threat landscape, relying solely on usernames and passwords is no longer sufficient to protect sensitive systems. Authentication mechanisms have become increasingly complex, driven by the need to support Single Page Applications (SPAs), mobile-first platforms, third-party integrations, and hybrid cloud environments. While this evolution has brought greater user convenience, […]
Web Services Testing: Safeguarding Your Web Applications Against XXE Attacks
As organizations increasingly rely on web services, particularly SOAP-based services, ensuring robust security through meticulous Web Services Testing has become critical. One common and significant vulnerability in these services is XML External Entity (XXE) Injection. This guide will demonstrate how comprehensive Web Services Testing can identify and mitigate such risks. What is XML External Entity […]
The Ultimate Guide to Securing Applications Through Software Security Testing
Software application security testing is essential in safeguarding applications against vulnerabilities and potential cyber-attacks. With increasing threats, ensuring the security of applications through thorough testing is crucial for protecting sensitive data and maintaining user trust. Common Types of Software Security Hacks and Vulnerabilities 1. Injection Attacks Injection attacks involve inserting malicious code into applications, often […]
PHP Security Code Review Cheat Sheet
In today’s development landscape among our customers, it’s rare to encounter production PHP code. However, when we do, the story is always the same. Typically, such code is riddled with numerous high and critical-level vulnerabilities. Reviewing and testing this kind of code feels like being transported back in time about 20 years when all the […]
Still Using SSRF to Take Over Cloud Deployments Once Again
How Server-Side Request Forgery Can Lead to Full Cloud Compromise – and What You Can Do About It Introduction Server-Side Request Forgery (SSRF) is a powerful exploit that enables attackers to trick a vulnerable server into making arbitrary HTTP requests on their behalf. While some view SSRF as merely a method to force the server […]
ReDoS
How a Simple Test Brought Down a Server You sanitized your input fields for XSS? You might have opened a new door for attackers… Imagine this: You’re a developer at your company. After a penetration test, several issues were found in your app, some input fields have no limits on length or content. This leaves […]
Hacking Android Apps Through Exposed Components
by Tal Melamed In almost every Android application, developers expose activities without sufficient protections. Exposing activities can lead to various attacks. For example, an attacker or a malicious app installed on the same device, can call those exposed activities to invoke internal pages of the application. Calling internal pages puts the application at risk of […]
Cryptography as a Solution – Using Advanced Techniques for Data Protection
Introduction to Data Protection In the world of information security it is highly advised to implement security solutions in layers. Solutions such as authentication, authorization, input validation and others help us maintain order and security when dealing with access to data. It is important to note that these techniques do not help with the data […]
Secure Development Lifecycle for Open Source Usage
Secure Development Lifecycle for Open Source Usage by Yaron Hakon Preface How do we adjust the SDL (Security Development Lifecycle) process for the growing use of open source in internal/external systems we develop and maintain? This is a question I hear a lot lately from our customers in some recent SDL projects we […]
Sandwich Attacks: From Reset Password to Account Takeover
Once Upon a Password Reset… You’ve just forgotten your password for a website. No big deal, you click “Forgot Password,” they send you a link, and you reset it. At the time the feature was designed, it was decided that this reset link would include a UUID token. The reasoning seemed sound—since UUIDs are unique, […]










