AppCheck Security Blog

FEATURED POST

Known Actively Exploited Vulnerabilities Round-up (11.10.24-17.10.24)

Appcheck - icons
If you think you would benefit from understanding how hackers are actively exploiting web applications and APIs today, including hacking demonstrations, prevention techniques, a review of the latest hacks, and a detailed overview of the vulnerability threat landscape, please respond today to secure your seats. (We’ll also take a sneak peek into the benefits, challenges, and recommendations for automated security testing of complex Web Applications and APIs)
Appcheck - icons
This article covers recent vulnerabilities found to be actively exploited. They are categorised based not only on the category of exploitation, but their impact, and versions affected. This article also informs on any official fix and remediation guidance for the listed vulnerabilities.
Appcheck - icons
In this blog post, we summarise key details for all Cisco security fixes released in the last month, as well as highlight some of the most critical issues.
Appcheck - icons
With complex authentication flows, parameter mining, request signing, and much more, AppCheck’s new dedicated API scanning tool ensures you are getting complete coverage.
Appcheck - icons
This article covers recent vulnerabilities found to be actively exploited. They are categorised based not only on the category of exploitation, but their impact, and versions affected. This article also informs on any official fix and remediation guidance for the listed vulnerabilities.
Appcheck - icons
This article covers recent vulnerabilities found to be actively exploited. They are categorised based not only on the category of exploitation, but their impact, and versions affected. This article also informs on any official fix and remediation guidance for the listed vulnerabilities.

Get in touch

Start your free trial

Your details
IP Addresses
URLs