Cybersecurity

WSO2 0-day Cross-Site Scripting Attack

SIG Cyber Identifies 0-Day in WSO2 Identity Server Earlier this year SIG identified and disclosed to WSO2 a previously unknown vulnerability (otherwise known as a... Read More »

What is a Web Application Penetration Test?

Note from the Editor: This blog is the first installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” A lot... Read More »

What to Expect After a Penetration Test

Note from the Editor: This blog is the last of a 10-part series entitled, “Everything you need to know about an Internal Penetration Test.” To read... Read More »

Top 5 Ways to Improve the Results of Penetration Test

Note from the Editor: This blog is part 9 of a 10-part series entitled, “Everything you need to know about an Internal Penetration Test.” To read... Read More »

How Much Does an Internal Penetration Test Cost?

Note from the Editor: This blog is part 8 of a 10-part series on Everything you need to know about an Internal Penetration Test. To read the... Read More »

What are some Potential Issues that can arise with an Internal Penetration Test?

Note from the Editor: This blog is part 7 of a 10-part series on Everything you need to know about an Internal Penetration Test. To read the... Read More »

What Is a PCI Internal Penetration Test?

Note from the Editor: This blog is part 6 of a 10-part series entitled, “Everything you need to know about an Internal Penetration Test.” To read... Read More »

Our Internal Penetration Testing Methodology

Note from the Editor: This blog is part 5 of a 10-part series on Everything you need to know about an Internal Penetration Test. To read the... Read More »