News & Articles

Our articles and guides on how to protect your startup from cybercriminals

Read about all the security issues that we find during our automated security reviews, and how to solve them.

Latest Articles

Authentication Request Identified

The 'Authentication Request Identified' vulnerability refers to a potential security weakness in the authentication mechanism of a web application. This vulnerability can be exploited by attackers to gain unauthorized access to sensitive information or perform malicious actions.

Vulnerabilities

Dangerous JS Functions

The 'Dangerous JS Functions' vulnerability is a web application security issue that can expose sensitive information or enable malicious activities due to the use of certain JavaScript functions that can be exploited by attackers.

Vulnerabilities

Modern Web Application

The 'Modern Web Application' vulnerability is a broad term used by external vulnerability scanners to highlight potential security weaknesses in web applications. It refers to a wide range of potential vulnerabilities, such as Cross-Site Scripting (XSS), SQL Injection, Cross-Site Request Forgery (CSRF), and more.

Vulnerabilities

Reverse Tabnabbing

"Reverse Tabnabbing" is a vulnerability that allows an attacker to deceive users by tampering with links, leading to potential phishing attacks or the disclosure of sensitive information.

Vulnerabilities

Httpoxy - Proxy Header Misuse

The Httpoxy vulnerability is a security issue that occurs due to a misconfiguration in the handling of proxy headers by web applications. This vulnerability allows an attacker to manipulate HTTP request headers, potentially leading to various attacks such as Remote Code Execution (RCE) or Information Disclosure.

Vulnerabilities

HTTP Only Site

The 'HTTP Only Site' vulnerability is a security concern that can expose your web application to potential attacks. By not enforcing the secure HTTPS protocol, sensitive information transmitted between the web server and the user's browser becomes vulnerable to interception and manipulation.

Vulnerabilities