Have you ever stopped and evaluated the security of your APIs?
In this article the approach is on how this resource has facilitated the…
Incremental Code Review x Internal Code Review Tests
When having the first contact with our clients or even companies interested in our…
What are the benefits of Threat Modeling?
To complete the idea on the post about Threat Modeling, on this post the approach is on the…
Contextualization
Why should we think on threat modeling? Well, during the software development process, some steps must be observed so…
Nowadays we use the term “safe coding” or even “safe design” these terms are becoming more and more common among the creators of…
This is a brief tutorial that aims to help those who are new in setting up an IPsec VPN connection with OpenSwan, hosted in cloud…
During a intrusion test conducted recently, I found a daemon called perfd which is listening on port 5227. According to IANA[1], the…
Hi there, For those using the RIPS scanner [1] to help the analysis of vulnerabilities on PHP code, pay attention not to leave it running…
A password is meant to secure an asset against unauthorized access from an attacker.
In order to prevent someone from gaining access, the…