Injection attacks are one of the most common attacks we saw in 2020. In fact, injections are ranked at number 1 in the OWASP Top Ten Web Application Security Risks. From our scans, we consistently see that websites are vulnerable to these types of attacks, sometimes critically.
In light of some of the recent high-profile attacks; We wanted to share some basic cybersecurity tips for businesses of all sizes and provide a simple checklist so that you can audit your company’s cybersecurity strategy.
As more companies insist employees work from home during this pandemic, many companies’ cybersecurity is a considerable risk. Can this lead to a network pandemic for companies and individuals?
TLS, SSL, HTTP, HTTPS, ….Are you not familiar with these terms or concepts? Many professionals may not know the network-related terminologies to read a security report. Find out some basic terminologies used by network officials in this blog.
You are running a startup and want to get started on cybersecurity? You just joined a startup and want to implement the first cybersecurity measures? You are interested in what cybersecurity activities should be implemented at a particular growth phase of a startup?
Crashtest Security is one of the Top 50 startups in Germany and a leading cybersecurity provider for web applications and APIs.
TLS 1.0 and 1.1 have been around for quite some time. TLS 1.0 was released in 1999, TLS 1.1 in 2006. They both should not be used anymore!
There are well-known attacks such as Padding Oracle Attacks or BEAST for those versions. That is why Crashtest Security shows TLS 1.0 & 1.1 as critical vulnerabilities.
You have just started using the built-in Kubernetes functionality on Docker for Mac? It is a promising alternative to docker-compose if you want to mirror your system infrastructure for local development. If you are using Kubernetes in production, you can easily use your existing pod definitions on your machine without set up a Kubernetes cluster like minikube yourself. This short blog post will show you how to collect all logs for your local cluster.
With coronavirus, a lot of people started to play Cards against Humanity over Zoom meetings. Soon after, Cards against Developers was getting a lot of attention. In this blog post, we want to highlight the following topics: