Featured post
/ Posted July 01, 2022
In this blog post, we examine what cryptocurrency is, how it works, and how its fundamental principles of operation can encourage the illicit activity known as cryptojacking. We also investigate the scale of the problem to date, and how it can best be guarded against, as well as detected should it occur.
read moreFilter by:
Research / Posted July 01, 2022
In this blog post, we examine what cryptocurrency is, how it works, and how its fundamental principles of operation can encourage the illicit activity known as cryptojacking. We also investigate the scale of the problem to date, and how it can best be guarded against, as well as detected should it occur.
Read moreResearch / Posted June 28, 2022
Brute force attacks are those attacks that rely purely on exhaustive effort rather than sophisticated techniques performed. They are used by attackers in several cybersecurity spheres including against encryption and authentication systems. We look at then different types of brute force attacks and the ways in which they can be avoided.
Read moreResearch / Posted June 08, 2022
In this blog post, we look at how filepath manipulation can occur at a technical level, at how attackers may seek to exploit such vulnerabilities, and at how developers and system administrators within an organisation can best guard against falling victim to such exploits.
Read moreResearch / Posted June 01, 2022
In this blog post we will review what cookies are, why cookies are needed at all, how cookies work, the weaknesses that cookies can be prone to both inherently as well as if implemented incorrectly, and how both website operators and general web users can help to ensure their secure implementation and usage.
Read moreResearch Security Alerts / Posted May 26, 2022
The AppCheck research team identified a Server-Side Request Forgery (SSRF) vulnerability within the DNN CMS platform, formerly known as DotNetNuke. SSRF vulnerabilities allow the attacker to exploit the target system to make network requests on their behalf, allowing a range of possible attacks. In the most common scenario, the attacker exploits SSRF vulnerabilities to attack systems behind the firewall and access sensitive information from Cloud Provider metadata services.
Read moreNews / Posted May 19, 2022
AppCheck has been shortlisted for Best Vulnerability Management Solution Award at this year's SC Awards Europe
Read moreResearch / Posted May 19, 2022
his blog post looks in more detail at how privilege escalation can occur, as well as highlighting some common variants and also how to best prevent or avoid them from happening.
Read moreResearch / Posted May 05, 2022
One tool that is often overlooked despite a history of deployment stretching back over thirty years is the honeypot, a deployed resource that is used to monitor and analyse attacks against a network, as well as reveal information about the attackers behind them. In this blog post we examine exactly what honeypots are and how they work, and whether they could benefit your organisation.
Read moreResearch / Posted April 21, 2022
“DOM” stands for “Document Object Model” and although you may not have heard of it, it underpins how every web browser interprets and renders web pages that are received from the server.
Read moreEvents / Posted April 14, 2022
Our AppCheck Web Application Security Seminar is coming to London, on May 27th, at Lord's Cricket Ground. This FREE educational day offers “A fantastic and revealing insight into the world of hacking.”
Read more