Password policy explained: What makes a good password? Passwords remain the most widely used authentication mechanism in the digital world. That’s why the “good password” is kinda treated as the Holy Grail. Banking applications, enterprise systems, cloud platforms,...
A 20-year-old hacker identified a security flaw in the online booking systems of Spanish luxury hotels and managed to reserve rooms and premium apartments for just 1 cent each. The largest single loss exceeded €4,000, while the cumulative damage reportedly reached...
A poorly configured cookie is often the quiet enabler behind session hijacking, account takeover and cross-site attacks. Not because cookies are inherently insecure, but because their security controls are left at default settings. XSS protection and CSRF mitigation...
Port scanning: Why should you knock on every door? You may think port scanning requires no more expertise than reading a water meter. Port scanning is regularly the foundation of internet hygiene, so it definitely does. Port scanning is checking whether you locked the...
The Silence Before the Attack: The role of passive OSINT reconnaissance in pentesting A single domain, a few skilled analysts and passive OSINT reconnaissance can already be enough to outline an organisation’s digital exposure. We are not talking about exploits or...