/ Posted April 06, 2020
Injection attacks are unique in that they have remained at the top of the OWASP Top 10 list since 2004. So for over a decade this type of vulnerability has been considered the most critical vulnerability for organisations to be aware of when developing code for the web.read more
Research / Posted April 06, 2020
Injection attacks are unique in that they have remained at the top of the OWASP Top 10 list since 2004. So for over a decade this type of vulnerability has been considered the most critical vulnerability for organisations to be aware of when developing code for the web.Read more
Events / Posted April 03, 2020
Having presented this popular session at the Digital Transformation Expo and the Cloud & Cyber Security Expo with overwhelming success, we have decided to provide this as a condensed webinar for those not able to attend.Read more
Product / Posted March 27, 2020
Take a no obligation, no hassle, complimentary automated penetration test with AppCheck and let our internal consultants provide you a thorough CVSS security report detailing our findings and recommended remediation. Our goal to uncover all High, Medium and Low risk vulnerabilities, including the OWASP TOP 10.Read more
Research / Posted March 25, 2020
Cross-Site Scripting or “XSS” is one of the most common vulnerabilities found in web applications. XSS made up nearly 40 per cent of all attacks logged by security researchers in recent years, who also noted that almost 75 per cent of large companies across Europe had been targeted over the last year.Read more
News / Posted March 18, 2020
During this time of uncertainty around the impacts related to COVID-19 we would like to reassure our customers, partners and employees that we anticipate minimal disruption to services and that staff well-being and helping keep customers secure remains our top priority.Read more
Research / Posted March 12, 2020
Injection attacks are the most common type of fault found in web applications, they are usually the result of unfiltered user input being directly included into command executions or database queries.Read more
Research / Posted March 09, 2020
A cache in computing is a temporary store of any content that has been retrieved from its original (master) source. Caches are typically used so that the data can be served faster the next time it is requested, since it needs only be retrieved from the local cache rather than the original source. The problem from a security point of view is that any response that is successfully cached will by design be stored and served to other users, and in some circumstances this can lead to problems.Read more
Events / Posted March 04, 2020
Cross-Site Scripting (XSS) is by far the most widespread high impact vulnerability, present even in the best of web applications, regardless of the framework or programming language employed - a burly steadfast member of the OWASP Top Ten.
Here at AppCheck the client-side nature of typical XSS has led to a general underappreciation of its exploitation potential, though a good understanding of the vulnerability and its subtle variations will show how it can be used to devastating effect... and more importantly: how it can be avoided.
In this seminar we will build up piece-by-piece an understanding of XSS that spares no detail.
Product / Posted March 03, 2020
A short summary of recent work on the product and an insight into the development of AppCheck.Read more
Security Alerts / Posted February 27, 2020
Aside from being a – by all accounts truly terrible – direct-to-TV movie about a recently deceased cat who comes back from the dead to try and stop scammers and wealthy businessmen from making unnecessary land-development deals, “Ghostcat” is also the fond nickname for vulnerability CVE-2020-1938.Read more