Security Blog

Feature development & monitoring tips

Author: AlexArchondakis

Alex is one of our managing consultants here at Pentest People. Focusing mainly on web application penetration testing. Alex has spoken at many key events while with us, including BSides London and even DSS ITSEC Latvia.

September 12, 2022

OWASP Verification Standard: Application Security and Standards

OWASP Verification Standard: Application Security and Standards At the beginning of August, CREST partnered with OWASP to release the OWASP Verification Standard (OVS), which is designed to formalise and expand on OWASP’s existing work on application security and their own security standards, including their Top 10 Project. OWASP has existed since December 2001 and has […]

Find Out More
September 8, 2022

Cyber Security Trends: The Evolving Nature of Cyber Security

Cyber Security Trends: The Evolving Nature of Cyber Security Following on from the previous article we posted regarding cyber security trends, we thought we’d revisit the topic and continue with another set to keep an eye on. The world of cyber security is always evolving and there’s always too much for just one article on […]

Find Out More
September 5, 2022

Cyber Security News: The NHS 111 Attack

Cyber Security News: The NHS 111 Attack In a recent article looking at cyber security trends, we highlighted the potential for incidents to occur from supply chain attacks, as well as the prevalence of ransomware across the Internet. No organisation is safe from attack, as illustrated by the NHS 111 attack at the beginning of […]

Find Out More
August 15, 2022

Current Cyber Security Trends Pt1

Current Cyber Security Trends As we pass the halfway point of 2022, it’s worth taking a look at the current trends which have been present within the cyber security world and what to look out for in the future. Being aware of trends allows organisations to plan for the future and put processes or defences […]

Find Out More
July 18, 2022

OWASP Top Ten: Insecure Design

 OWASP Top Ten: Insecure Design A new addition to the OWASP Top Ten, Insecure design is one of the leading causes of data breaches today. By understanding and avoiding these patterns, you can make your Web Applications more secure. In this blog post, we will give you a brief overview of Insecure Design and provide […]

Find Out More
July 7, 2022

OWASP Top Ten: Cryptographic Failures

OWASP Top Ten: Cryptographic Failures Cryptographic Failures are a major security problem. They can lead to data breaches, identity theft, and other serious problems. The Open Web Application Security Project (OWASP) has identified ten major failures. These failures can be divided into three categories: Cryptographic design flaws, cryptographic implementation errors and cryptographic key management. What […]

Find Out More
July 4, 2022

OWASP Top Ten: Injection

OWASP Top Ten: Injection Injection is one of the top OWASP vulnerabilities for a reason. It can allow attackers to inject their own malicious code into programs, which can result in serious security breaches. This blog post will discuss what injection is, how it occurs, and some of the most common attack vectors. We will […]

Find Out More