What does an ethical hacker do? – And why it is a business question Spoiler: an ethical hacker – aka pentester – is not sitting in a dark basement wearing a black hoodie. Even if Hollywood has done a remarkably good job convincing us otherwise. So what does an ethical...
Clickjacking: When a click doesn’t mean what you think In the world of web security, many attacks rely on complex exploits, vulnerable code or poorly configured systems, but clickjacking belongs to a very different category. Here, the attacker’s goal is not to break...
Password policy explained: What makes a good password? Passwords remain the most widely used authentication mechanism in the digital world. That’s why the “good password” is kinda treated as the Holy Grail. Banking applications, enterprise systems, cloud platforms,...
A 20-year-old hacker identified a security flaw in the online booking systems of Spanish luxury hotels and managed to reserve rooms and premium apartments for just 1 cent each. The largest single loss exceeded €4,000, while the cumulative damage reportedly reached...
A poorly configured cookie is often the quiet enabler behind session hijacking, account takeover and cross-site attacks. Not because cookies are inherently insecure, but because their security controls are left at default settings. XSS protection and CSRF mitigation...