AppCheck Security Blog

FEATURED POST

Halloween Cyber Security Quiz

Appcheck - icons
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.
Appcheck - icons
Microsoft Word is a word processor developed by Microsoft. It was first released on October 25, 1983, under the name Multi-Tool Word for Xenix systems. Commercial versions of Word are licensed as a standalone product or as a component of Microsoft 365 suite of software, which can be purchased either with a perpetual license or as part of a Microsoft 365 subscription, respectively.
Appcheck - icons
Apache RocketMQ is a distributed messaging and streaming platform with low latency, high performance and reliability, trillion-level capacity and flexible scalability. It is the third generation distributed messaging middleware open sourced by Alibaba in 2012. On November 21, 2016, Alibaba donated RocketMQ to the Apache Software Foundation. Apache RocketMQ is one of the most popular and widely used distributed messaging and streaming platforms.
Appcheck - icons
In this blog post we look at what vulnerabilities can occur when web applications fail to validate redirect URLS, and the impact should these be exploited, as well as how they can best be protected against.
Appcheck - icons
Adobe ColdFusion is a commercial rapid web-application development computing platform (The programming language used with that platform is also commonly called ColdFusion, though is more accurately known as CFML.) ColdFusion was originally designed to make it easier to connect simple HTML pages to a database. By version 2 (1996) it had become a full platform that included an IDE in addition to a full scripting language.
Appcheck - icons
In this blog post, we look in detail at the various stages that combine to form a complete kill chain, and how knowledge of the model can help to better inform an organisation’s efforts to secure its technical estate, systems and data against attacks and attempted compromise.

Get in touch

Start your free trial

Your details
IP Addresses
URLs