Site map
Posts by category
- Category: Blog
- Obtain secrets from different sources
- Git secret leaks
- Bash/zsh scripts. Part 3
- Secure secrets management in Docker containers. Part 2
- Secure secrets management in Docker containers. Part 1
- Insecure deserialization
- Input processing vulnerabilities
- Spring4Shell as a class injection example
- JNDI injection
- JNDI injection. Log4Shell case study
- JNDI injection. JDBC
- Avoiding injection vulnerabilities
- Avoiding XSS injection vulnerabilities
- Avoiding OS command injection
- Avoiding Templates injection
- Avoiding other injections
- Category: How to
- The future of PCI DSS: What would I expect from version 5.0
- Custom Approaches for Different Maturity Levels in Cybersecurity
- DORA and PCI DSS
- The Evolution of Security Testing: Navigating the DORA Framework for the Financial Sector
- Myths and Realities of Code Security Review
- How to Choose the Right Penetration Testing for Your Business?
- Category: IT Audits
- Category: Secure coding
- Category: Injection vulnerabilities
- Category: Input processing vulnerabilities
- Category: Secure secret management
- Category: Case Studies
- Cloud Infrastructure Audit and Performance testing case
- PCI DSS segmentation testing case
- Social engineering
- Payment processing API penetration testing
- Client-Bank application compromise
- Internal Adversary Simulation case study
- Internal Adversary Simulation Case
- Azure Active Directory compromise
- EDR product’s effectiveness evaluation
- Improve and optimize the testing process
- The New Way of Working
- Testing Management
- Automated testing
- Category: Case studies. QA Management
- Category: Case studies. Security
- Category: Cloud Services
- Category: Consulting
- Category: Cybersecurity Services
- Security Code Review
- Security Assessment of the Architecture
- Developer/DevOps adversary simulation
- Infrastructure penetration testing
- Social engineering assessments
- Adversary simulation
- Category: Penetration testing
- Internal Infrastructure Penetration Test
- External Infrastructure Penetration Test
- Cybersecurity Compromise
- Vulnerability Assessment
- OSINT – Open Source Intelligence
- Vulnerabilities Scanning
- DORA — Digital Operational Resilience Act
- TIBER-EU Framework
- Threat Intelligence
- Mobile Application Penetration Testing
- API Penetration Testing
- Web Application Penetration Testing
- Category: Red Teaming
- Category: Security audit services
- Category: Social Engineering
- Category: Phishing
- Category: DevOps Practice
- Category: Managed Testing Services
- Category: Professional services
- Category: Services
- Category: Services Pages
- Category: Software Quality Assurance
- Category: Software Testing
- Category: Training
- Category: Vacancies