AppCheck Security Blog

FEATURED POST

**CRITICAL RISK** CVE-2023-42115 Exim Mail Transfer Agent < v4.9.7 – Unauthorised Remote Execution of Arbitrary Code via Out of Bounds Write in SMTP Service

Appcheck - icons
Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs.
Appcheck - icons
Meep meep! and Thufferin’ Thuccotash! It must be Wabbit Season in vulnerability management – a critical buffer overflow vulnerability dubbed “Looney Tuneables” is being actively exploited (likely by varmints) in GNU/Linux Operating Systems, so ¡Andale! ¡Andale! Time to get patching! Full details below:
Appcheck - icons
DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process.
Appcheck - icons
If you think you would benefit from understanding how hackers are actively exploiting web applications and APIs today, including hacking demonstrations, prevention techniques, a review of the latest hacks, and a detailed overview of the vulnerability threat landscape, please respond today to secure your seats. (We’ll also take a sneak peek into the benefits, challenges, and recommendations for automated security testing of complex Web Applications and APIs)
Appcheck - icons
In this blog post, we look at what the “security onion” model encompasses, how it can be applied, and what value this provides to an organisation’s cybersecurity programme and initiatives.
Appcheck - icons
Bathed in digital moonlight (glow from a monitor), amidst the web’s labyrinthine threads, our fearless cyber security experts set out to confront your digital adversaries. It’s time to peek out from behind your fingers and explore the spine-chilling world of web application vulnerabilities!

Get in touch

Please enable JavaScript in your browser to complete this form.
Name

Start your free trial

Your details
IP Addresses
URLs