• Are you reviewing in depth your mobile applications?

    Are you reviewing in depth your mobile applications?

  • Marco Morana, Director at Minded Security UK has released a brand new book on Process for Attack Simulation and Threat Analysis.

    Marco Morana, Director at Minded Security UK has released a brand new book on Process for Attack Simulation and Threat Analysis.

  • Are your developers aware about how to fix vulnerabilites in the code?

    Are your developers aware about how to fix vulnerabilites in the code?

  •  Is your management aware of cyber security risks?

    Is your management aware of cyber security risks?

  • Do you know which vulnerabilities have most impact to your business?

    Do you know which vulnerabilities have most impact to your business?

  • Are you verifying the JavaScript Code you are developing?

    Are you verifying the JavaScript Code you are developing?

Latest news from our blog

How to prevent Path Traversal in .NET

IntroductionA well-known, never out of fashion and highly impact vulnerability is the Path Traversal. This technique is also known as dot-dot-slash attack (../) or as a directory traversal, and it consists in exploiting an insufficient security validation/sanitization of user input, which is used by the application t...

Posted on Tuesday October 23

3.100.000

end users protected

1000M

dynamic web pages scanned

17

Achieved Countries