Author: Valentyn Havryliuk

Valentyn Havryliuk

QA Engineer at QAwerk
linkedin

Valentyn excels in API and web application testing, skillfully employing tools like Postman to guarantee software reliability and performance. His extensive experience has cultivated a profound knowledge of quality assurance, guiding precise and effective testing strategies.

Recent posts by Valentyn

Web App Pen Testing Checklist: Your Detailed Guide

Web App Pen Testing Checklist: Your Detailed Guide

The annual cost of cybercrime damage is growing every year. In 2023, the US saw a 22% spike in cybercrime losses, reaching a staggering $12.5 billion. Business email compromise, investment scams, rans...

Read More
Penetration Testing Frequency: How Often To Conduct a Pen Test

Penetration Testing Frequency: How Often To Conduct a Pen Test

No one likes reporting on data breaches and reassuring their customers that their data is still in safe hands. That’s why businesses should take proactive actions to enhance their security posture, ...

Read More
Software and Data Integrity Failures: Explanation, Examples, Prevention

Software and Data Integrity Failures: Explanation, Examples, Prevention

Modern software development practices like Agile, DevOps, and CI/CD have revolutionized the software development landscape with automation and high speed. While this enables faster release cycles, it ...

Read More
Security Logging and Monitoring Failures: Explanation and Examples

Security Logging and Monitoring Failures: Explanation and Examples

In this age of increasing cyber threats, the security of web applications has become a paramount concern. Malicious entities are always on a lookout for new opportunities like lack of logging and moni...

Read More
What is SSRF (Server-Side Request Forgery)? Examples and Prevention

What is SSRF (Server-Side Request Forgery)? Examples and Prevention

Every day, thousands of new vulnerabilities emerge, creating new opportunities for hackers. The bad guys don’t take breaks or vacations! They are actively working to compromise your systems....

Read More
Insecure Design Vulnerability: Explanation and Examples

Insecure Design Vulnerability: Explanation and Examples

In today’s rapid-fire development environments, security can often be a neglected afterthought. Applications that lack effective security controls are low-hanging fruit for threat actors. Thus ...

Read More
Vulnerable and Outdated Components: Explanation, Examples, Prevention

Vulnerable and Outdated Components: Explanation, Examples, Prevention

In the modern digital age, technology is part and parcel of our everyday lives. However, there are serious threats inherent in the use of web applications. Software risks can come from various sources...

Read More
iOS 17 Beta Features and Bugs

iOS 17 Beta Features and Bugs

Our QA team prepared a comprehensive overview of iOS 17 beta features and bugs. Read on to see real screenshots and new features in action!...

Read More
What is Cross-Site Scripting (XSS) and How to Prevent It?

What is Cross-Site Scripting (XSS) and How to Prevent It?

We live in the era of rapid digital transformation with innovative solutions allowing us to perform a wide range of things faster and easier. As technologies continue advancing, hackers and threat act...

Read More
What Is Broken Authentication? Examples and How to Prevent It

What Is Broken Authentication? Examples and How to Prevent It

What is broken authentication? What makes a strong password? How can poor session management result in broken authentication? Read on to find out....

Read More
What is Remote File Inclusion (RFI) Vulnerability?

What is Remote File Inclusion (RFI) Vulnerability?

August 6, 1991. Does the date ring any bells? No, it wasn’t the collapse of the Soviet Union (though you’re close). It was on that otherwise unremarkable summer day that Tim Berners-Lee launched...

Read More
Broken Access Control Vulnerability: Explanation and Examples

Broken Access Control Vulnerability: Explanation and Examples

The internet is NOT a safe place. Wonderful in its own right, sure, and useful in more ways than one. But the cyberspace is also filled to the brim with malicious agents: thieves, hackers, countless...

Read More
Security Misconfiguration Vulnerability: Explanation, Examples, Prevention

Security Misconfiguration Vulnerability: Explanation, Examples, Prevention

They say that programming is the closest thing to magic that we have today. And you know what? They’re right. A few lines of code that look like nothing but gibberish to the uninitiated - and you ...

Read More
What is Local File Inclusion (LFI) Vulnerability?

What is Local File Inclusion (LFI) Vulnerability?

Modern web applications are nothing like what they used to be. The practically limitless bandwidth and indefinite storage space that cloud computing offers. The microservices that run circles aro...

Read More
Cryptographic Failure Vulnerability: Explanation and Examples

Cryptographic Failure Vulnerability: Explanation and Examples

They say that he who rules the data rules the world. They also say that knowledge is power. Phrase it any way you want, one thing is certain - information is the hottest commodity these days. Hav...

Read More
Why is Penetration Testing Important?

Why is Penetration Testing Important?

[table_content] Introduction What is Penetration Testing? What is Most Likely to Get You Hacked? Mobile Applications Web Sites and Web API Scripts Software Applications ...

Read More
What is SQL Injection Vulnerability?

What is SQL Injection Vulnerability?

The rapid development of new technologies has given businesses not only a competitive edge and a profitability boost but also a major cybersecurity headache. Nowadays, hackers can perform both manua...

Read More
How to Detect Pegasus Spyware on iOS and Android?

How to Detect Pegasus Spyware on iOS and Android?

Pegasus has been in the headlines of major media outlets for a couple of weeks now, resurfacing such burning issues as freedom of expression and privacy concerns. The hype over Pegasus is quite reas...

Read More