AppCheck Security Blog

Hacks by URL: Devastating and Criminally Simple

AppCheck would like to invite you and your colleagues to our next 1-hour webinar surrounding the subtle dangers of the humble URL.

read more

Hacks by URL: Devastating and Criminally Simple

AppCheck would like to invite you and your colleagues to our next 1-hour webinar surrounding the subtle dangers of the humble URL.

Read more

Hacks by URL: Devastating and Criminally Simple

Having presented this popular session at the Digital Transformation Expo and the Cloud & Cyber Security Expo with overwhelming success, we have decided to provide this as a condensed webinar for those not able to attend.

Read more

An Introduction to Web Shells

A web shell is a web-based implementation of the shell concept. There’s plenty of legitimate examples where a web shell might be useful functionality – for example to provide an administrative web GUI to an appliance such as a firewall, but for the purposes of this article we will consider malicious web shells - scripts that can be uploaded by an attacker to a web server to enable remote administration of the machine unknown to the system’s proper owner.

Read more

Injection Attacks: An Introduction

Injection attacks are unique in that they have remained at the top of the OWASP Top 10 list since 2004. So for over a decade this type of vulnerability has been considered the most critical vulnerability for organisations to be aware of when developing code for the web.

Read more

Hacks by URL: Devastating and Criminally Simple

Having presented this popular session at the Digital Transformation Expo and the Cloud & Cyber Security Expo with overwhelming success, we have decided to provide this as a condensed webinar for those not able to attend.

Read more

In the current climate would you benefit from a free IT Security Test?

Take a no obligation, no hassle, complimentary automated penetration test with AppCheck and let our internal consultants provide you a thorough CVSS security report detailing our findings and recommended remediation. Our goal to uncover all High, Medium and Low risk vulnerabilities, including the OWASP TOP 10.

Read more

What is Cross-Site Scripting (XSS) and how to prevent it

Cross-Site Scripting or “XSS” is one of the most common vulnerabilities found in web applications. XSS made up nearly 40 per cent of all attacks logged by security researchers in recent years, who also noted that almost 75 per cent of large companies across Europe had been targeted over the last year.

Read more

COVID-19 Update

During this time of uncertainty around the impacts related to COVID-19 we would like to reassure our customers, partners and employees that we anticipate minimal disruption to services and that staff well-being and helping keep customers secure remains our top priority.

Read more

An Introduction to SQL Injection (SQLi)

Injection attacks are the most common type of fault found in web applications, they are usually the result of unfiltered user input being directly included into command executions or database queries.

Read more

Web cache poisoning explained

A cache in computing is a temporary store of any content that has been retrieved from its original (master) source. Caches are typically used so that the data can be served faster the next time it is requested, since it needs only be retrieved from the local cache rather than the original source. The problem from a security point of view is that any response that is successfully cached will by design be stored and served to other users, and in some circumstances this can lead to problems.

Read more