cybersecurity

Can Dast Be Used For Non Web Applications As Well?

Can DAST Be Used for Non-Web Applications as Well?

The boundary between websites, web applications, web services, APIs, and mobile applications is becoming increasingly blurred. Web technologies have become the default choice for software development, with frontends communicating with backends via APIs in complex distributed architectures and deployment models. As the lines between different types of applications blur, it becomes crucial to have reliable […]

Can DAST Be Used for Non-Web Applications as Well? Read More »

Getting Down To Business With Static And Dynamic Application Security

Getting Down to Business with Static and Dynamic Application Security Testing

Getting lost in cybersecurity jargon, AppSec acronyms, and vendor claims? Here’s your guide to what two of the major application security testing technologies can and cannot do—and why you should be worrying more about getting the big picture of your application security risks and less about deciding between acronyms. What is DAST and what is

Getting Down to Business with Static and Dynamic Application Security Testing Read More »

Building Software Securely: A Comprehensive Guide

Building Software Securely: A Comprehensive Guide

Application security is a critical component of modern cybersecurity, safeguarding applications from threats that can compromise data integrity, user privacy, and system stability. Organizations that fail to implement robust security measures expose themselves to cyberattacks, data breaches, and compliance violations.To build a strong security foundation, application security relies on three essential pillars: secure software development,

Building Software Securely: A Comprehensive Guide Read More »

Ducks, dinosaurs, and XSS: A little knowledge is a dangerous thing in security

A Limited Understanding Poses Security Risks

We all sometimes work with incomplete information and get by quite well. In fact, having the full picture is rarely required in day-to-day life. It only becomes important when dealing with problems that require extensive knowledge about the subject to get everything exactly right, especially in areas where you can’t immediately check if what you’re

A Limited Understanding Poses Security Risks Read More »

Brainstorm tool release: Optimizing web fuzzing with local LLMs

Improving Web Fuzzing Efficiency Using Local Language Model-based Methods

Introducing brainstorm Brainstorm is a web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery. It combines traditional web fuzzing techniques (as implemented in ffuf) with AI-powered path generation to discover hidden endpoints, files, and directories in web applications. Brainstorm usually finds more endpoints with fewer requests. The tool

Improving Web Fuzzing Efficiency Using Local Language Model-based Methods Read More »

System prompt exposure: How AI image generators may leak sensitive instructions

The Potential Risks of AI Image Generators Exposing Sensitive Instructions

Diffusion models Diffusion models are generative artificial intelligence models that produce unique photorealistic images from text prompts. A diffusion model creates images by slowly turning random noise into a clear picture. It starts with just noise and, step by step, removes bits of it, slowly shaping the random patterns into a recognizable image. This process

The Potential Risks of AI Image Generators Exposing Sensitive Instructions Read More »