AppCheck Security Blog

Case Study - Queen's University of Belfast

We caught up with Queen's University Belfast to see how AppCheck has helped them. Take a look at what they said.

read more

Case Study - Queen's University of Belfast

We caught up with Queen's University Belfast to see how AppCheck has helped them. Take a look at what they said.

Read more

Macy's falls victim to hack exposing customer data

Popular department store Macy's looks to have been hit with a card skimming hack.
The hack appears very similar to those conducted by hacking group Magecart who have historically targeted Airline giants British Airways as well as online ticket sales company Ticketmaster, amongst others.

Read more

AppCheck Webinar: URL's, Uploads & Dragons [New date announced]

The team here at AppCheck would like to invite you and your colleagues to our next 1-hour webinar surrounding the subtle dangers of the humble URL. We ran this session at The Cyber Hack Theatre at the Digital Transformation Expo London 2019 this year and due to the overwhelming success have decided to provide this as a webinar for those not able to attend.

Read more

Manchester Web Application Security Seminar - November 2019

Web Application Security Seminar

The Web Application Security seminar is a free event that presents a detailed analysis of the most common threats facing web applications today. We will review high profile examples and provide a technical breakdown of critical security flaws along with an introduction into emerging technologies such as HTML5.
Each candidate will receive a copy of the slides and exclusive tools and exploit code used in the live hacking demonstrations.

Read more

New Chrome Zero Day

Google hasn’t released official details on the exploit but in a nutshell memory corruption vulnerabilities were found in key components of the Chrome browser which could potentially lead to code execution on the user's machine if a malicious page is visited.

Read more

Halloween Special: AppCheck's Scariest Vulnerabilities

AppCheck’s Dev team got their heads together to come up with the Top 5 Vulnerabilities that keep them up at night.

Now this list isn’t all-encompassing or a list of the worst vulnerabilities out there. Each one is on the list for a different reason. Continue reading to discover why we these particular vulnerabilities give us the chills and fangs for checking it out.

Read more

Case Study - Music Magpie

'[AppCheck] provides us with a tool we can use whenever we want rather than the position we were in before of getting visibility twice a year and being charged for anything outside that. It puts the power back with us and arms us with everything we need to stay on top of vulnerabilities.'

Some amazing feedback from global retailers Music Magpie when we spoke with their IT team recently.

Read more

Case Study - The University of Derby

'AppCheck has had such a positive impact across the business in many aspects. It has given the organisation transparency, it produces good reports, it provides peace of mind.'
See what the University of Derby had to say about AppCheck when we caught up with their IT Department.

Read more

AppCheck Webinar: URL's, Uploads & Dragons

Handling file uploads and processing URLs should be easy, right? Well, it turns out there are many things that can go wrong, in lots of different ways, and at many levels (e.g. an application, a framework, the web browser, a proxy server). We explore through example how assumptions and subtle mishandling of URLs and files can lead to various high severity OWASP top 10 vulnerabilities.

Read more

Web Application Security Seminar - November 2019

Web Application Security Seminar

The Web Application Security seminar is a free event that presents a detailed analysis of the most common threats facing web applications today. We will review high profile examples and provide a technical breakdown of critical security flaws along with an introduction into emerging technologies such as HTML5.
Each candidate will receive a copy of the slides and exclusive tools and exploit code used in the live hacking demonstrations.

Read more