Cyber risks of working from home – Maintaining control over your IT environments

Cyber risks of working from home – Maintaining control over your IT environments

Working from home (WFH) has taken over as the new normal for employees at many organizations. Whether your outlook for extended WFH and social distancing is glass-half-full or half-empty, if you’re in IT, you’ve probably realized it drastically expands the estate...
NoSQL Injections and How to Avoid Them

NoSQL Injections and How to Avoid Them

A NoSQL injection vulnerability is an error in a web application that uses a NoSQL database. This web application security issue lets a malicious party bypass authentication, extract data, modify data, or even gain complete control over the application. NoSQL...
SaaS Cost Analysis – Getting the Upper Hand in SaaS Vendor Negotiations

SaaS Cost Analysis – Getting the Upper Hand in SaaS Vendor Negotiations

Organizations are ratcheting up how much they’re spending on cloud-based software—SaaS in particular—while cutting on-premises software. It’s likely that SaaS solutions already represent a rapidly growing part of your enterprise application portfolio. Do you have...
Scanning the bWAPP Application with Acunetix

Scanning the bWAPP Application with Acunetix

The bWAPP application is an intentionally vulnerable web application. It was developed for educational purposes – in fact, bWAPP stands for buggy Web APPlication. We will show you how to deploy this web application and we will scan it using...
Scanning the DVWA Application with Acunetix

Scanning the DVWA Application with Acunetix

DVWA is an intentionally vulnerable web application that you can install on your server to test vulnerability scanners or to practice penetration testing. You may want to use DVWA to test the capabilities of the Acunetix vulnerability scanner and compare it to similar...