
Small businesses are increasingly becoming targets for cybercriminals. More often, attackers target smaller organizations because they’re perceived as easier targets
In today’s digital-first business world, one of the most subtle yet devastating weapons cyber adversaries employ is Business Email Compromise
Contents Description Classification Examples Remediation References Description Transport Layer Security (TLS) and Secure Socket Layer (SSL) Protocols are used to
Security awareness assessments are an effective means of gauging your employees susceptibility to clicking on suspicious links or engaging in
Contents Description Classification Examples Remediation References Description Applications and environments are often only as secure as their weakest user account
Contents Description Classification Examples Remediation References Description Cross-site scripting (XSS) is a code injection attack caused by improper input sanitization
We have been working closely with APIsec University and are excited to announce the release of the API Security Certified
Contents Description Classification Examples Remediation References Description User Enumeration occurs on web applications when there are discrepancies in responses received
Previously, we discussed the process of creating a Threat Map to identify ways in which attackers may target your organization
While businesses are ever more connected to the outside world, they also face an increasing threat of cyberattacks. At the
Password managers are applications that securely store your login credentials across devices. Instead of juggling dozens of weak or reused passwords, you only need to remember one master password. The manager handles the rest – generating strong, unique passwords for each account and autofilling them when needed.
A real case highlighted the risks of poor password habits: A business owner using the same password for personal and professional accounts had both compromised. This led to unauthorized access, fraudulent invoices being sent, and financial losses.
There has been an increase in the number of scam emails originating from PayPal. In these instances, the target victim
There’s no question about it, PortSwigger’s Burp Suite is the de-facto tool for testing web applications for security vulnerabilities. It’s
Too often, I’ve started a web application penetration test with one set of user credentials, a target application URL and
Don’t miss out on the latest news. Sign up now to get access to the library of members-only articles.
©2025 Maltek Solutions, LLC