Providing access to the source code during a pentest has mainly advantages or disadvantages, depending on the point of view!
Here is our feedback, which relates in particular to web application pentests.
Providing access to the source code during a pentest has mainly advantages or disadvantages, depending on the point of view!
Here is our feedback, which relates in particular to web application pentests.
The security of web applications is a major issue for organisations. SaaS platforms, internal applications, or e-commerce websites, all these systems must be secured to counter the increasing number of attacks targeting all their functionalities and components: servers, APIs, authentication, sessions, access control, third-party components, etc.
Beyond the protection against attacks, security has also become a key factor and a differentiating asset in pre-sales processes, particularly in B2B.
We do pentests every day. (Well, 5 days a week.) Today we’re taking you behind the scenes: we’ve got a closer look at the penetration tests performed in 2020, to share with you some figures on the vulnerabilities found.
We have also identified the three most frequent vulnerabilities found during our pentests and give our insight on the presence of these flaws. Finally, we present some other observations from our penetration tests.
Used for phishing and other social engineering attacks, email spoofing is terribly tricky. Well executed, it’s difficult to detect and misleads the recipient.
To counter it, there are technical solutions to put in place when you configure your mail servers. We will see the three essential elements to install to prevent email spoofing: SPF, DKIM and DMARC.
From data breaches to malwares, cybersecurity is in the headlines almost every day and has become a major concern. Especially in the context of the health crisis, cyberattacks are affecting companies of all sizes. How can you prepare for cyberattacks?
We selected some current cybersecurity statistics, in order to know the current trends of threats in 2021. To prepare to face cyberattacks, a pentest is a very effective solution to strengthen your security.
For many startups, cybersecurity and penetration testing in particular are issues that need to be addressed because of the requests of their customers or investors.
Some startups have a security by design approach and processes that integrate security testing into the software development cycle. Other startups are less mature on the subject, as they do not have in-house security skills. They have questions when it becomes necessary to perform a first pentest.
Risks assessed during a pentest generally focus on attacks perpetrated from outside the information system. Indeed, a classic approach consists of first testing the risks of external attacks (black box pentest), and then the risks of attacks from a customer or partner access (grey box pentest).
Security is one of the main concerns of SaaS application publishers. Security is essential for users to trust the solution and to ensure that data is protected.
Authentication security, data compartmentalisation, data encryption, but also user journey security, service continuity and third-party integrations… The security issues of SaaS applications are multiple. A pentest allows you to assess the robustness of a SaaS platform in order to test and strengthen its security level. Here is a list of subjects that deserve special attention during a pentest.
Mobile applications are part of the elements to secure as they process personal data, access sensitive information, and in some cases enable remote control of devices. Widely used for IoT devices, they are also at the core of the business model of many FinTech, HealthTech and innovative companies from various industries.
Mobile application security encompasses different aspects: the security of the mobile applications themselves (iOS or Android version), the security of the APIs and the security of the servers. Back-end security (APIs and servers) is usually more critical than front-end security (iOS / Android apps), but this depends on the technical and functional context of the application itself.
CREST, OSCP, CEH… Should you require certifications from your pentest providers? To select a pentest provider, security certifications are obviously useful although they cannot be the only way to assess the value of a service and the skill level of pentesters. There are other aspects that should be considered too. Another related topic is the recognition of the pentest value and the certificates that you may be able to show to your customers.