The Open Web Application Security Project (OWASP) Top 10 is a consensus list of the top web application security concerns, guiding testers and developers. The 2021 version includes new categories and relabelled items, providing a great resource for application security and audit/compliance. Leverage the OWASP Top 10 to spread awareness and make sure you don't miss out on anything.
Blog / Vulnerability
This blog post defines GDPR Compliance for web application and API security, lists its potential technical and business impacts for the critical risks, explains how the Probely scanner can help with GDPR compliance and provides examples of what you can do right now to get started.
As a Small Business owner, your security is probably not at the top of your to-do list. Even though we constantly see headlines of big breaches and corporations being targets of sophisticated attacks, small businesses that suffer from web-based attacks aren’t really prominent in the media. This might have you fall in a false sense of security.
Log4j is a Java-based logging utility that is widely used in the Java world. Check if your application is vulnerable to log4j using Probely.
The fine British Airways are facing is related to a 2018 data breach that affected thousands of customers and compromised data from over 380,000 card payments. The fine was issued due to BA’s failure to comply with GDPR rules. Preventing the breach would not have only avoided the fine (obviously), but it would’ve prevented a much more costly outcome — thousands of dissatisfied customers that lost trust in the brand.
In this article, we propose how to create a modern and secure TLS setup, while maintaining adequate compatibility. Additionally, we provide ready-to-use Terraform examples for a Docker-based nginx reverse proxy setup, with TLS 1.3 support, and Let’s Encrypt automatic certificate renewal, for both Amazon Web Services and Google Cloud Platform.
Cryptojacking is the digital version of it — it’s when the hacker steals your computer’s resources and uses them to harvest cryptocurrency. Mining is only a viable business if the cost of the computing power and electricity required to operate and cool down your systems is significantly lower than the monetary gain you get from mining.
Facebook announced it suffered an attack that affected almost 50 million users. The hack required the chaining of multiple vulnerabilities, being one of them in the “View As” feature, that help users control their privacy by previewing how other users see their profile.
To make security easier and simpler for you, we have added some new exciting features. And to make it more accessible, we have also introduced new pricing plans. Starting with the pricing plans, we now have four plans, one of them being a free plan.