AppCheck Security Blog

FEATURED POST

Advisory: CVE-2020-29045 – Unauthenticated RCE via Arbitrary Object Deserialisation in Five Star Restaurant Menu – WordPress Ordering Plugin

Appcheck - icons
In this blog post, we take a look at how security software can become out of date and what risks that might post for an organisation if left unaddressed.
Appcheck - icons
If you think you would benefit from understanding how hackers are actively exploiting web applications and APIs today, including hacking demonstrations, prevention techniques, a review of the latest hacks, and a detailed overview of the vulnerability threat landscape, please respond today to secure your seats. (We’ll also take a sneak peek into the benefits, challenges, and recommendations for automated security testing of complex Web Applications and APIs)
Appcheck - icons
In this blog post we provide a high-level summary or overview of what automated vulnerability scanning entails, and how it can help provide assurance in the security posture of an organisation, reducing the likelihood of any security exploits occurring.
Appcheck - icons
In this blog post, we look at why information disclosure is considered to be an issue at all, how it occurs, the ways in which the information can be leveraged by attackers, and how organisations can best prevent against it.
Appcheck - icons
Software applications have changed how we work and conduct everyday business. Web applications in particular increasingly handle sensitive data, which has, in turn, amplified data privacy and security issues. Ensuring the security of web applications and infrastructure is therefore vital to organisations. Protecting sensitive data, staying safe from emerging threats and vulnerabilities, and navigating legal and regulatory compliance are all critical parts of almost every IT department.
Appcheck - icons
In this post we look at a unique method of delivering a SSRF payload and review how this could be leveraged to fully compromise a cloud environment. We will also dive into the potential risks and impact of SSRF and highlight the importance of a secure cloud deployment.

Get in touch

Start your free trial

Your details
IP Addresses
URLs