Security Penetration Testing Blog

Cybersecurity Basics Checklist – 10 Steps for Beginning Your Strategy
Jul 23, 2020 / Felix Brombacher

In light of some of the recent high-profile attacks; We wanted to share some basic cybersecurity tips for businesses of all sizes and provide a simple checklist so that you can audit your company’s cybersecurity strategy.

Has Corona Infected Your Data Too?
Jul 06, 2020 / Felix Brombacher

As more companies insist employees work from home during this pandemic, many companies’ cybersecurity is a considerable risk. Can this lead to a network pandemic for companies and individuals?

What is TLS, SSL, HTTP & HTTPS? How Do They Work Together?
Jun 05, 2020 / René Milzarek

TLS, SSL, HTTP, HTTPS, ….Are you not familiar with these terms or concepts? Many professionals may not know the network-related terminologies to read a security report. Find out some basic terminologies used by network officials in this blog.

Startup Cybersecurity Guidelines: What’s Needed Nn Your Growth Stage?
May 04, 2020 / Felix Brombacher

You are running a startup and want to get started on cybersecurity? You just joined a startup and want to implement the first cybersecurity measures? You are interested in what cybersecurity activities should be implemented at a particular growth phase of a startup?

Crashtest Security – New Features to Scan Modern Web Apps
Mar 31, 2020 / René Milzarek

Crashtest Security is one of the Top 50 startups in Germany and a leading cybersecurity provider for web applications and APIs.

JavaScript Apps: Automated Security Testing Challenges
Mar 25, 2020 / René Milzarek

According to the most recent StackOverflow Developer Survey, JavaScript is the most popular programming language amongst professional developers (69,7%). Most modern apps use this frontend technology to dynamically load content from the backend based on user behaviour or other events.

The 6 Most Important Web Vulnerabilities For Managers
Feb 28, 2020 / Felix Brombacher

The world of IT security can confuse all the different vulnerabilities, exploits and newly emerging trends. In this article, we summarise and shortly explain the top 6 most important web vulnerabilities that managers need to be aware of and tackle constantly.

The Ongoing Changes of Browser Support for TLS 1.0 & 1.1
Jan 29, 2020 / René Milzarek

TLS 1.0 and 1.1 have been around for quite some time. TLS 1.0 was released in 1999, TLS 1.1 in 2006. They both should not be used anymore!
There are well-known attacks such as Padding Oracle Attacks or BEAST for those versions. That is why Crashtest Security shows TLS 1.0 & 1.1 as critical vulnerabilities.

Container Security Collect Kubernetes Logs on Docker for Mac
Aug 12, 2019 / René Milzarek

You have just started using the built-in Kubernetes functionality on Docker for Mac? It is a promising alternative to docker-compose if you want to mirror your system infrastructure for local development. If you are using Kubernetes in production, you can easily use your existing pod definitions on your machine without set up a Kubernetes cluster like minikube yourself. This short blog post will show you how to collect all logs for your local cluster.

Cards Against Developers – Why Developers Create A Card Game
Aug 09, 2019 / Felix Brombacher

With coronavirus, a lot of people started to play Cards against Humanity over Zoom meetings. Soon after, Cards against Developers was getting a lot of attention. In this blog post, we want to highlight the following topics: