AppCheck Security Blog

FEATURED POST

GhostCat Vulnerability – CVE-2020-1938

Appcheck - icons
One tool that is often overlooked despite a history of deployment stretching back over thirty years is the honeypot, a deployed resource that is used to monitor and analyse attacks against a network, as well as reveal information about the attackers behind them. In this blog post we examine exactly what honeypots are and how they work, and whether they could benefit your organisation.
Appcheck - icons
“DOM” stands for “Document Object Model” and although you may not have heard of it, it underpins how every web browser interprets and renders web pages that are received from the server.
Appcheck - icons
Our AppCheck Web Application Security Seminar is coming to London, on May 27th, at Lord’s Cricket Ground. This FREE educational day offers “A fantastic and revealing insight into the world of hacking.”
Appcheck - icons
A recent zero-day vulnerability has been publicly shared revealing a critical issue with the nginx-ldap-auth software package allowing attackers to potentially bypass authentication and disclose key information on vulnerable servers.
Appcheck - icons
System hardening is the practice of securing a computer system by minimising its attack surface. Measures used can include the uninstallation of unneeded or unused software, especially those which run a network service, and the changing of various system or application settings from flexible default values to more secure values
Appcheck - icons
Spring4Shell is a newly discovered remote code execution and we’re already seeing this being actively exploited.

Get in touch

Start your free trial

Your details
IP Addresses
URLs