Blog

Blog

Security Practices in Web Application Development - OWASP TOP 10

blog |
Is there 100% error free software? Is there 100% secure software? The answer to both questions is NO, but don't panic.
Show

Intigriti XSS challenge write-up

blog | | František Uhrecký
Intigriti published a DOM XSS Challenge available at Intigriti’s bug bounty platform. The assignment was to exploit a DOM XSS vulnerability on this page and to trigger a pop up of the document.domain (challenge.intigriti.io).
Show

How to audit Smart Contracts

blog |
Good question, actually. Since blockchain and the use of Smart Contracts is quite a new concept, there is no widely recognized standard for testing Smart Contracts. This article will provide an insight into the approach we use here, at Citadelo, when auditing Smart Contracts.
Show

Cloudflare, how to do it right and don't reveal your real IP

blog | | Martin Hanic
The goal of this blogpost is to show what needs to be done to have a secure working setup, explain why all of the countermeasures are really necessary by demonstrating the attacks that they are mitigating, to not reveal your origin IP address.
Show

Malware trends in 2018- Ransomware left behind by mining viruses

blog |
This blog is about CoinHive. I will describe how it affects websites, how websites get infected and how to prevent it or how to get rid of it.
Show

How to order a pen test

Blog | | Martin Hanic
Although people working in the IT security industry may consider this question to be as trivial as "How to order a phone charger", for many, writing a purchase order for a penetration test can be like designing a nuclear power plant.
Show