News
Zerolynx: reference in TLPT Tests - Red Team fo...
The DORA (Digital Operational Resilience Act) regulation, adopted by the European Union, establishes a regulatory framework to strengthen the digital operational resilience of financial entities,...
Zerolynx: reference in TLPT Tests - Red Team fo...
The DORA (Digital Operational Resilience Act) regulation, adopted by the European Union, establishes a regulatory framework to strengthen the digital operational resilience of financial entities,...
The ISO 27000 series: Beyond ISO 27001 and 27002
The ISO 27000 series is key to information security management, covering much more than the well-known ISO 27001. Standards such as ISO 27017 and 27018 strengthen security and privacy in...
The ISO 27000 series: Beyond ISO 27001 and 27002
The ISO 27000 series is key to information security management, covering much more than the well-known ISO 27001. Standards such as ISO 27017 and 27018 strengthen security and privacy in...
A05:2021 – Security misconfiguration
Introduction Vulnerability Description As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...
A05:2021 – Security misconfiguration
Introduction Vulnerability Description As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...
The new DORA regulation: Implications for Digit...
The DORA regulation, also known as the Digital Operational Resilience Act, is a crucial regulatory framework recently implemented by the European Union that seeks to strengthen the digital operational resilience...
The new DORA regulation: Implications for Digit...
The DORA regulation, also known as the Digital Operational Resilience Act, is a crucial regulatory framework recently implemented by the European Union that seeks to strengthen the digital operational resilience...
A04:2021 - Insecure design - Information disclo...
Introduction The disclosure of information is a security vulnerability, the criticality of which will depend on how sensitive the information obtained is. It occurs when a web application exposes...
A04:2021 - Insecure design - Information disclo...
Introduction The disclosure of information is a security vulnerability, the criticality of which will depend on how sensitive the information obtained is. It occurs when a web application exposes...
A03:2021 – Injection
Injections are a type of vulnerability consisting of an attacker sending untrustworthy data through a request or query to an interpreter, causing a...
A03:2021 – Injection
Injections are a type of vulnerability consisting of an attacker sending untrustworthy data through a request or query to an interpreter, causing a...