SQL Injection: How We Found In A Fintech Startup
SQL injection was first discovered in 1998 and presented by Jeff Forristal at Blackhat. Unfortunately, we recently found this vulnerability in a fintech client’s public API, which can be used by integrations. SQL Injection vulnerability can allow an attacker to gain access to the entire database leading to a potential data breach. Background: The API […]
What Is Internal Penetration Testing? A Practical Guide
Internal Penetration Testing plays a crucial role in identifying vulnerabilities and protecting businesses against potential breaches. It is an essential step for organizations aiming to test the resilience of their existing internal network defenses. In this blog post, we will explore the various phases involved in internal penetration testing and highlight the importance of each. […]
Penetration Testing Services
Penetration testing services are essential for organisations to ensure the security of their systems and data. Vulnerability assessment involves identifying and evaluating the vulnerabilities in a system, network, or application. This process helps organizations understand the potential risks and threats that could compromise their security. On the other hand, pen testing involves simulating a cyber […]