Site map
Blog
- Applying Henry Ford’s Management Principles to software development
- Avoiding injection vulnerabilities
- Avoiding OS command injection
- Avoiding other injections
- Avoiding Templates injection
- Avoiding XSS injection vulnerabilities
- Bash/zsh scripts. Part 3
- Getting Started with Cybersecurity for Your Company: A Short Guide
- Git secret leaks
- How to Choose the Right Penetration Testing for Your Business?
- Input processing vulnerabilities
- Insecure deserialization
- JNDI injection
- JNDI injection. JDBC
- JNDI injection. Log4Shell case study
- Obtain secrets from different sources
- Secure secrets management in Docker containers. Part 1
- Secure secrets management in Docker containers. Part 2
- Secure Software Development Life Cycle (Secure SDLC)
- Security Audit: Our Approach and Process
- Spring4Shell as a class injection example
Case Studies
- Automated testing
- Azure Active Directory compromise
- Client-Bank application compromise
- Cloud Infrastructure Audit and Performance testing case
- EDR product’s effectiveness evaluation
- Improve and optimize the testing process
- Internal Adversary Simulation Case
- Internal Adversary Simulation case study
- Payment processing API penetration testing
- PCI DSS segmentation testing case
- Social engineering
- Testing Management
- The New Way of Working
Case studies. QA Management
Case studies. Security
Cloud Services
Cyber awareness
Cybersecurity Services
- Adversary simulation
- Developer/DevOps adversary simulation
- How to Choose the Right Penetration Testing for Your Business?
- Infrastructure penetration testing
- Red Team—a simulated cyber attack on your organisation
- Red Teaming
- Secure Software Development Life Cycle (Secure SDLC)
- Security Assessment of the Architecture
- Security Audit: Our Approach and Process
- Security Code Review
- Social engineering assessments
DevOps Practice
How to
Injection vulnerabilities
Input processing vulnerabilities
Managed Testing Services
Penetration testing
Professional services
Secure coding
- Avoiding injection vulnerabilities
- Avoiding OS command injection
- Avoiding other injections
- Avoiding Templates injection
- Avoiding XSS injection vulnerabilities
- Bash/zsh scripts. Part 3
- Git secret leaks
- Input processing vulnerabilities
- Insecure deserialization
- JNDI injection
- JNDI injection. JDBC
- JNDI injection. Log4Shell case study
- Obtain secrets from different sources
- Secure secrets management in Docker containers. Part 1
- Secure secrets management in Docker containers. Part 2
- Spring4Shell as a class injection example
Secure secret management
Security audit services
Services
- Adversary simulation
- Application penetration testing
- Developer/DevOps adversary simulation
- Functional testing
- Infrastructure penetration testing
- Performance testing
- Red Team—a simulated cyber attack on your organisation
- Secure Software Development Life Cycle (Secure SDLC)
- Security Assessment of the Architecture
- Security Code Review
- Social engineering assessments