AppCheck Security Blog

FEATURED POST

Secarma Automated Testing Podcast – Nick Blundell

Appcheck - icons
MinIO is a High-Performance Object Storage released under GNU Affero General Public License v3.0. It is API compatible with the Amazon S3 cloud storage service. It can handle unstructured data such as photos, videos, log files, backups, and container images with a current maximum supported object size of 50TB.
Appcheck - icons
WebP is a modern image format that provides superior lossless and lossy compression for images on the web.
Appcheck - icons
In this blog post, we look at NoSQL security and why it’s important. NoSQL databases are database systems that store data in alternative formats other than conventional relational tables. The databases gained traction due to a notable reduction in storage expenses.
Appcheck - icons
In this blog post, we look at cross-site leaks. “XSS” and “SQLi” are household names within web application security – vulnerabilities that will be known by name, if not in exact detail of implementation, by almost everyone working within the IT sector. “Cross-Site Leaks” … isn’t. But Google web security researcher Krzysztof Kotowicz recently predicted that it’s only a matter of time until this little-known vulnerability may soon make it into the industry-standard OWASP Top 10 list.
Appcheck - icons
Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage Portable Document Format (PDF) files. The family comprises Acrobat Reader (formerly Reader), Acrobat (formerly Exchange) and Acrobat.com. The basic Acrobat Reader, available for several desktop and mobile platforms, is freeware; it supports viewing, printing, scaling or resizing and annotating of PDF files. It is currently available for Windows, macOS, iOS, and Android users only.
Appcheck - icons
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.

Get in touch

Start your free trial

Your details
IP Addresses
URLs