AppCheck Security Blog

DNS Security

We will look at how the DNS system developed, as well as how some of the decisions taken in establishing the protocols used for DNS, leave it vulnerable to certain exploits. Finally, we will cover some of the more esoteric exploits using the protocol that have since been discovered or developed by researchers and hackers, as well as what can be done to ensure that DNS implementations and usages are suitably secured wherever possible.

read more

DNS Security

We will look at how the DNS system developed, as well as how some of the decisions taken in establishing the protocols used for DNS, leave it vulnerable to certain exploits. Finally, we will cover some of the more esoteric exploits using the protocol that have since been discovered or developed by researchers and hackers, as well as what can be done to ensure that DNS implementations and usages are suitably secured wherever possible.

Read more

The New OpenSSL Critical Vulnerability - Early Information and Detections

This article will cover what we know so far, how AppCheck customers can detect the issue and details of how we can help if you're not an existing customer. We will be updating the article as new information arises so keep checking back.

Read more

File Upload Vulnerabilities

In this blog post, we take a deeper than usual dive into the topic of file upload vulnerabilities: we look at the mechanisms that operate underneath the hood when uploading and storing files on a webserver, and at how these can be exploited by attackers if developers fail to adequately ensure their safe implementation and operation.

Read more

What is Open-Source Intelligence (OSINT)?

This blog post aims to introduce a few of the key OSINT techniques, look at who makes use of OSINT, explore how OSINT can be used in the cyber security space to aid in the enumeration phase of a web application security assessment.

Read more

World's Strangest Hacks

We take a look at some of the World's Strangest Hacks. From MI6 Mojito Cupcakes to a Godzilla rampage in San Francisco, there are plenty of weird breaches to explore!

Read more

What is web application security testing and how can it help?

Web application security testing is a key detective measure that helps to ensure that any issues that have been introduced during the application’s planning, design, development, and implementation are speedily detected and flagged for attention so that they can be addressed and remediated before an attacker can exploit them. This article explores the benefits of Web Application Security Testing and how it can help your organisation.

Read more

Case Study - Rail Delivery Group

Rail Delivery Group were struggling with a lack of visibility of the applications that they used or created. Outsourcing business created the issue of relying on third parties  to be up to date and have little to no vulnerabilities in their networks and applications. AppCheck was able to provide this visibility and ensure it could be easily presented to stakeholders in the business. 

Read more

Session Hijacking

In this blog post, we look at how exactly session hijacking works in practice, the underlying mechanics of session management that permit it to occur, how attackers may choose to exploit the weakness when it is discovered, and how website users and site administrators can best safeguard themselves and their organisations against the exploit.

Read more

Deep Dive: HTTP Parameter Pollution

In this blog post, we investigate how and why HTTP parameter pollution is possible at all, how it can potentially be exploited to undermine web application security, and how it can be guarded against by developers, system architects and others.

Read more

Web API Vulnerability Scanning

Application Programming Interfaces or APIs have existed for decades. However, they have recently seen a significant expansion in usage from their traditional use within areas such as Business to Business (B2B) or partner integrations into several new areas. [read more...]

Read more