
Cookie Security Flags
Learn about HTTP cookies, how they are used and how they can be used to secure web traffic. This blog will go into technical details as well as the practical
Learn about HTTP cookies, how they are used and how they can be used to secure web traffic. This blog will go into technical details as well as the practical
Learn about how HSTS protects users against a variety of threats. We will discuss the use cases for HSTS, how it affects user experience and how it works under the
Password managers stand as an essential tool in the modern digital landscape. With the escalating number of online accounts, they offer a secure repository to organise and store a multitude
A good MSSP (Managed Security Service Provider) should be able to service all their clients cyber security needs to a very high standard. With the sheer size of the cyber
Subdomain takeovers are where an attacker is able to abuse dangling DNS aliases for cloud services to host their own content on an organisation’s subdomain. This content could consist of
Within almost 99% of web application penetration tests, there is usually at least one TLS / SSL related issue. Typically these are either reported as a Low CVSS score, or
Multi-Factor Authentication (MFA) has been widely adopted over the years as a means to enhance the security of authentication processes for all sorts of systems. It has somewhat become a