Tag

Pentesting

Browsing

Some of my best friends are ethical hackers. With the holidays approaching, these special people in my life will need special presents. Whether they are bounty hunting, pentesting as a part of a consulting project, doing security research to advance the field or working on a Red Team, they will want tools and information to make their life easier in the new year. Pick one of the Xmas gifts from the list below, and you…

By @aLLy , Wallarm Research Hello guys, time to talk details about Wallarm FAST (Framework for Application Security Testing). It’s a new automatic web vulnerability scanning and fuzzing detection tool by Wallarm Inc. It is well suited for security researchers in enterprise Red Teams as well as for teams in charge of test automation in CI/CD environments. The main goal of the tool is to help significantly increase security test coverage and to use Wallarm learned…

Testing the security of the corporate applications is a part of every-day life for Ops and DevOps professionals. Larger companies have whole teams dedicated to independent security testing, called Red Teams. These folks use various tools at their disposal to discover the flaws in both applications and infrastructure. These teams often take the same approach as pen testers — external contractors that are hired to penetrate the company defences. More recently, many companies are supplementing their internal…

by Maximiliano Soler, @maxisoler by Maximiliano Soller, CTO of ArtsSECThe greatest thing with partnerships is how well the organisations’ expertise complement each other. Our partnership with Wallarm has incredibly exceeded our expectations in their innovation and expertise in web application security. Especially interesting is how Wallarm identifies behavioral attacks with obfuscated or malicious payloads and blocks requests that might result into exploits. It is also uniquely comes with three layers of machine learning that generate applications…

How Bug Bounty Programs Help Improve SaaS and Web Security By Captain Jack Sparrow, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=34447425 As many companies who have found themselves victims of a debilitating ransomware attack or major data breach have found out; an ounce of prevention is worth a pound of cure. The same is true for software and web based product companies in regards to exploits within their software products or web applications. Better to have it discovered by…