AppCheck Security Blog

FEATURED POST

Cryptojacking

Appcheck - icons
DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process.
Appcheck - icons
If you think you would benefit from understanding how hackers are actively exploiting web applications and APIs today, including hacking demonstrations, prevention techniques, a review of the latest hacks, and a detailed overview of the vulnerability threat landscape, please respond today to secure your seats. (We’ll also take a sneak peek into the benefits, challenges, and recommendations for automated security testing of complex Web Applications and APIs)
Appcheck - icons
In this blog post, we look at what the “security onion” model encompasses, how it can be applied, and what value this provides to an organisation’s cybersecurity programme and initiatives.
Appcheck - icons
Bathed in digital moonlight (glow from a monitor), amidst the web’s labyrinthine threads, our fearless cyber security experts set out to confront your digital adversaries. It’s time to peek out from behind your fingers and explore the spine-chilling world of web application vulnerabilities!
Appcheck - icons
Roundcube is a web-based IMAP email client. Roundcube’s most prominent feature is the pervasive use of Ajax technology. Roundcube is written in PHP and can be employed in conjunction with a LAMP stack, or any other operating systems that support PHP are supported as well. Roundcube Webmail is designed to run on standard web servers such as Apache, LiteSpeed, Nginx, Lighttpd, Hiawatha or Cherokee in conjunction with a relational database engine. Supported databases are MySQL, PostgreSQL and SQLite. The user interface is rendered in XHTML and CSS. Roundcube incorporates jQuery as part of its distribution, as well as other libraries such as GoogieSpell and TinyMCE.
Appcheck - icons
In this blog post we look at the different types of hackers known to operate, describing their differing motivations, techniques, and practices. Awareness of the different threats they pose can be key to defending organisations from the specific types of attacks that might be launched against them.

Get in touch

Start your free trial

Your details
IP Addresses
URLs