Amazon S3 is a great, cheap and flexible option when it comes to sharing and hosting files. However what is not great is that any file can be uploaded to a S3 bucket. And by any file we mean any file including malicious files. It is very common for people not to check the files that are uploaded to S3. But it is possible to virus scan files uploaded to S3. it just takes a little bit of work.Find Out More
Author: Jason Bruce-Helliwell
Jason is a Senior Systems Engineer at Pentest People.
In our third part of our SQL Series we look at how to guard against a lesser known but just as serious vulnerability, Second Order Injection.Find Out More
As SQL is still the most common vulnerability in the OWASP Top 10, let’s take a quick look at how this vulnerability is still exploitable.Find Out More
Git is a great Version Control System, we all probably use it everyday without thinking what else it can be used for apart from version control. With some plugins, a few extra commands and the use of one or two tools, it can improve your development skills and general day-to-day working life.Find Out More
SQL Injection is a very common critical vulnerability and for years it has been listed in the OWASP Top 10. Many developers are aware of it and know how to prevent it. But with the rise of NoSQL databases are you familiar with potential NoSQL injection vulnerabilities?Find Out More