Top QA Events in 2023: Quarter 1 Ultimate Guide

Top QA Events in 2023: Quarter 1 Ultimate Guide

Learn about upcoming QA events in 2023: in-person and virtual options across the world listed!
Cover_HRnest

Bugs‌ ‌found‌ ‌in‌ HRnest SaaS

Bug Crawl is a quality assurance-centric project by QAwerk that is aimed at perfecting software applications on the most popular platforms and eliminating possible bugs. If you are an app-owner, request a Bug Crawl for your app or service and run a green checkbox mile with our experienced QA engineers.
What is Remote File Inclusion (RFI) Vulnerability?

What is Remote File Inclusion (RFI) Vulnerability?

August 6, 1991. Does the date ring any bells? No, it wasn’t the collapse of the Soviet Union (though you’re close). It was on that otherwise unremarkable summer day that Tim Berners-Lee launched the very first web page. More than thirty years have passed since then, and websites have come a long way, haven’t they?
Broken Access Control Vulnerability: Explanation and Examples

Broken Access Control Vulnerability: Explanation and Examples

The internet is NOT a safe place. Wonderful in its own right, sure, and useful in more ways than one. But the cyberspace is also filled to the brim with malicious agents: thieves, hackers, countless different criminals looking to prey on the weak and the vulnerable. Don’t be alarmed just yet though. As long as
Security Misconfiguration Vulnerability: Explanation, Examples, Prevention

Security Misconfiguration Vulnerability: Explanation, Examples, Prevention

They say that programming is the closest thing to magic that we have today. And you know what? They’re right. A few lines of code that look like nothing but gibberish to the uninitiated – and you can create entire worlds. How is it anything but magic? On the opposite side, a few different lines
What is Local File Inclusion (LFI) Vulnerability?

What is Local File Inclusion (LFI) Vulnerability?

Modern web applications are nothing like what they used to be. The practically limitless bandwidth and indefinite storage space that cloud computing offers. The microservices that run circles around monolith architecture, breaking down layered apps into small independent components. The single-page apps that load most resources (including the primary DOM elements) once per app cycle
Cryptographic Failure Vulnerability: Explanation and Examples

Cryptographic Failure Vulnerability: Explanation and Examples

They say that he who rules the data rules the world. They also say that knowledge is power. Phrase it any way you want, one thing is certain – information is the hottest commodity these days. Have you ever wondered why most services these days, especially online, are technically free? That’s ‘cause we’re not the
Top QA events in 2022: Quarter 4 Ultimate Guide

Top QA events in 2022: Quarter 4 Ultimate Guide

Learn about upcoming tech events for software testers, QA analysts, QA leads, and IT decision makers! In-person, online, and hybrid options listed.
Tech Talk with Jon Pass, COO of Magic Mountain

Tech Talk with Jon Pass, COO of Magic Mountain

We’re thrilled to launch a new blog format – tech talks with remarkable IT professionals, entrepreneurs, and thought leaders across industries who also happen to be QAwerk clients. In this interview, Jonathan Pass, COO of Magic Mountain, will look back on the journey the Magic Mountain team has taken to be where they’re right now.
QAwerk Clients Stand With Ukraine

QAwerk Clients Stand With Ukraine

There’s hardly any person who hasn’t heard about Russia invading Ukraine on February 24th. As a Ukraine-based company, we are directly affected, and we can’t stay silent. The lives of millions of people have been turned upside down; thousands of peaceful Ukrainians have lost their homes, lives, and loved ones. For what? For the absurd