Security Penetration Testing Blog

Prevent Web Application Framework Information Leakage
Apr 02, 2021 / Borislav Kiprin

Obtaining information about the used web application frameworks is a crucial task for any attacker. There may be vulnerabilities in certain frameworks that give an attacker the needed attack vector.

Versioning Systems Integrations
/ Borislav Kiprin

Your versioning system is the memory of your DevOps process. Read here how you can easily integrate the Crashtest Security Suite Scans.

Ticketing System Integrations
/ Borislav Kiprin

Your ticketing system is where you store your upcoming tasks and rank your To-Dos according to importance. We strongly believe that severe security vulnerabilities should be on the top of your list. Therefore, we explain in this article how you can use our tool to create automatic tickets if vulnerabilities should be detected.

Chat Tools Integrations
/ Borislav Kiprin

The Crashtest Security Suite can be integrated into the most common chat tools to notify your web application security immediately.

Integration in Vulnerability Management Solutions
/ Borislav Kiprin

This guide will focus on the easy integration of the Crashtest Security This guide will focus on the easy integration of the Crashtest Security Suite with vulnerability management solutions, such as DefectDojo or Faraday.

CI / CD Pipeline Integrations
/ Borislav Kiprin

Your CI/CD is the engine of your DevOps process. Read here how you can easily integrate the Crashtest Security Suite into your CI/CD Pipeline.

Create a secure DevSecOps Pipeline
Apr 01, 2021 / Borislav Kiprin

How to create a secure DevSecOps Build Pipeline for a Python Application using CircleCI and the Crashtest Security Suite

The 6 Most Popular CI/CD Tools
Dec 21, 2020 / Felix Brombacher

Continuous Integration and Continuous Delivery (CI/CD Tools) are combined DevOps best practices of automating different application development stages. At its core, a CI/CD pipeline enforces automation by removing team level silos and incorporating tools that enable efficiency.

X-XSS-Protection Retired, What To Do Instead?
Dec 15, 2020 / Felix Brombacher

As vulnerability scanning software, we have to constantly develop to keep up with the latest threats and updates. Recently we removed support for the X-XSS-Protection header.

Things to Consider When Choosing Your Cybersecurity Tech Stack
Nov 25, 2020 / René Milzarek

The evolving nature of cyber attacks has necessitated an overhauled defence deterrence for cybersecurity. Choosing the right cybersecurity tech stack helps administer security from external threats while ensuring you only adopt the tools and platforms relevant to your application and related workflows. As with any other form of technology, cybersecurity requires a combination of security practices (the approach) and software tools (the tech stack).