What is Local File Inclusion (LFI) Vulnerability?

What is Local File Inclusion (LFI) Vulnerability?

Modern web applications are nothing like what they used to be. The practically limitless bandwidth and indefinite storage space that cloud computing offers. The microservices that run circles around monolith architecture, breaking down layered apps into small independent components. The single-page apps that load most resources (including the primary DOM elements) once per app cycle
Cryptographic Failure Vulnerability: Explanation and Examples

Cryptographic Failure Vulnerability: Explanation and Examples

They say that he who rules the data rules the world. They also say that knowledge is power. Phrase it any way you want, one thing is certain – information is the hottest commodity these days. Have you ever wondered why most services these days, especially online, are technically free? That’s ‘cause we’re not the
Why is Penetration Testing Important?

Why is Penetration Testing Important?

Introduction Cybercrime today is a massive business. Predicted damages inflicted by it for the year 2021 are totaling 6 trillion USD globally (a quick reminder, a trillion is a million million – yes, that much). Putting things into perspective, in terms of earnings, cybercrime puts such giants as Tesla, Facebook, Microsoft, Apple, Amazon, and Walmart
What is SQL Injection Vulnerability?

What is SQL Injection Vulnerability?

The rapid development of new technologies has given businesses not only a competitive edge and a profitability boost but also a major cybersecurity headache. Nowadays, hackers can perform both manual and automated attacks, which grow more sophisticated day by day. The funny thing is that although some of the most popular software vulnerabilities are well-known
How to Detect Pegasus Spyware on iOS and Android?

How to Detect Pegasus Spyware on iOS and Android?

Pegasus has been in the headlines of major media outlets for a couple of weeks now, resurfacing such burning issues as freedom of expression and privacy concerns. The hype over Pegasus is quite reasonable: it is one of the most powerful and covertly operating software in its niche. With more and more witnesses confessing their
iPhone Theft in Barcelona: How it Was + Security Tips Thieves Hate

iPhone Theft in Barcelona: How it Was + Security Tips Thieves Hate

The story below happened to our iOS developer on his trip to Barcelona in May. Sergey works for our development unit at Redwerk and is really tech-savvy. Luckily, he knew how to act and didn’t give attackers a chance to get a hold of his information and cash when his iPhone X was stolen. How