AppCheck Security Blog

FEATURED POST

Introduction to… Deserialisation Vulnerabilities

Appcheck - icons
In this blog post we look at some of the common risks associated with VPN deployment, and how they can best be avoided so that technical services and functions can be delivered to the required audiences with greater security assurance.
Appcheck - icons
In this blog post we look at what trust boundaries are, how they are commonly utilised, and what simple processes teams can take in order to begin the process of implementing trust boundaries in order to better manage cybersecurity risk.
Appcheck - icons
In this blog post we take a step back from some of our more serious and informational content and dive instead into the world of entertainment, taking a light-hearted look at some of the most common tropes found in movie portrayals of hacking.
Appcheck - icons
In this blog post we take a look at the wider context of database security by briefly surveying the various scenarios surrounding database configuration, deployment and maintenance that can lead to security weaknesses. We then take a look at what measures organisations can take to harden their database systems to better resist attacks or exploits by adversaries.
Appcheck - icons
We will look at how the DNS system developed, as well as how some of the decisions taken in establishing the protocols used for DNS, leave it vulnerable to certain exploits. Finally, we will cover some of the more esoteric exploits using the protocol that have since been discovered or developed by researchers and hackers, as well as what can be done to ensure that DNS implementations and usages are suitably secured wherever possible.
Appcheck - icons
This article will cover what we know so far, how AppCheck customers can detect the issue and details of how we can help if you’re not an existing customer. We will be updating the article as new information arises so keep checking back.

Get in touch

Start your free trial

Your details
IP Addresses
URLs