News & Articles

Our articles and guides on how to protect your startup from cybercriminals

Read about all the security issues that we find during our automated security reviews, and how to solve them.

Latest Articles

Top 10 Security Best Practices For Contentful

Cyberattacks can lead to significant financial losses, damage your reputation, and even result in legal consequences. As a non-technical small business owner, it's important to understand and implement security best practices, especially when using tools like Contentful, a popular content management system (CMS). This guide will walk you through the top ten security best practices for Contentful.

Mitigations

Top 10 Security Best Practices For Adobe Experience Manager (AEM)

As a small business owner, protecting your digital assets and customer data should be a top priority. This not only helps in building trust with your customers but also ensures compliance with various regulatory requirements. Adobe Experience Manager (AEM) is a powerful content management system used by many businesses. However, like any other system, AEM is vulnerable to cyber threats if not properly secured. In this manual, we will delve into the importance of cybersecurity for small businesses and provide a detailed step-by-step guide to implementing the top ten security best practices for AEM.

Mitigations

Top 10 Security Best Practices For WordPress

Cybersecurity is essential for small businesses, especially those using platforms like WordPress, because a breach can lead to loss of customer trust, legal penalties, and significant financial damage. By implementing robust security measures, you can protect sensitive data, maintain your reputation, and ensure the smooth operation of your business.

Mitigations

XZ Utils Vulnerability in Linux (CVE-2024-3094)

A critical vulnerability (CVE-2024-3094) was discovered in the widely used XZ Utils library, a data compression suite present in most Linux distributions. This vulnerability stemmed from malicious code injected by a compromised maintainer.

Vulnerabilities

Permissions Policy Header Not Set

One often overlooked web application security aspect is the Permissions Policy Header, a crucial mechanism to control various browser features and APIs that might pose risks to your web application's security. In this blog, we'll delve into the significance of setting the Permissions Policy Header, explore real-life examples of its vulnerabilities, and provide actionable mitigation strategies with code samples.‍

Vulnerabilities

Cloud Metadata Potentially Exposed

One critical web application vulnerability that continues to pose a significant threat is the exposure of cloud metadata. Cloud metadata can be exploited by attackers to gain unauthorized access and potentially compromise the entire system. In this blog, we will explore real-life examples of cloud metadata exposure and provide detailed mitigation guidelines, including code samples, to help you safeguard your web applications.

Vulnerabilities