The Ultimate Guide to Code Signing Best Practices

The Top 11 Code Signing Best Practices to Protect Your Customers and Keep Your Software Tamper-Free Want to protect your home from thieves? A security system is a popular option. However, it’s not very effective if you don’t install it properly, fail to activate it when you aren’t home, or use “123456” as the security code. The same ... Read More »

7th Apr 2021
The Ultimate Guide to Stored XSS Attacks

Stored XSS Attacks, Also Known as Persistent XSS Attacks, Are the Type With the Farthest Reach and Highest Potential Damage Recently, we took a closer look at one of the items on the OWASP Top 10 Vulnerability List – cross-site scripting (XSS). In that post, we covered the basics of XSS attacks and performed a quick overview on each of the ... Read More »

19th Mar 2021
Spear Phishing: How It Happens & Why You May Be at Risk

When phishing gets hyper-focused, it becomes more convincing. Learn how to spot a spear phishing attack before you “click here.” No matter what technology is available, deception is a critical skill for any bad actor. Whether you call them con artists, scammers, threat actors, or even hackers, the ability to manipulate others with messaging ... Read More »

26th Feb 2021
Everything You Need to Know About ARP Spoofing

ARP Spoofing Attacks Lets Hackers Impersonate Your PC and Steal All Your Traffic It’s a common trope in spy movies. You’re watching, popcorn in hand, when suddenly a character does something completely unexpected and unlike them. You’re in shock. You ask yourself “What just happened? I thought they were both good guys? Why did he ... Read More »

22nd Feb 2021