HIMSS 2019 – Champions of Security Unite

Organizations of all sizes and industries face increasing challenges in safeguarding vast amounts of sensitive data, with Health Care being no different. The loss of Protected Health Information (PHI) incurs not only heavy fines and brand damage, but potentially everlasting damage to affected patients. According to the Ponemon Institute: The average total cost of a …

HIMSS 2019 – Champions of Security Unite Read More »

Three C-Words of Web App Security: Part 3 – Clickjacking

This is the third and final part in this three-part series, Three C-Words of Web Application Security. I wrote a sort of prologue back in April, called A Brief Evolution of Web Apps, just to set the scene for those less versed in web application history. The first part, which was on CORS (Cross-Origin Resource …

Three C-Words of Web App Security: Part 3 – Clickjacking Read More »

Fuzz Testing

If you have a brand new piece of software, a program, a network, or an operating system, you will want to test it for any bugs, coding errors or other potential issues before it goes live. Fuzzing is a great way to do so. It’s also a good method to perform quality checks of your …

Fuzz Testing Read More »

Stored XSS; What Is It

In the cyber security world, there are a number of vulnerabilities to be aware of. Today we’re going to look at a specific one; Stored Cross-Site Scripting (XSS). Let’s start off by answering; what is cross-site scripting? An XSS attack is a type of injection that sends data through trusted sources, like web requests.  This …

Stored XSS; What Is It Read More »

2018 Year in Review

As we put the finishing touches on another tremendous year, and look toward the New Year, we at Secure Ideas wanted to take a moment to reflect upon 2018, and highlight some of what’s to come in 2019. This past year and in 2019,  we made a concerted effort to focus on offering affordable training …

2018 Year in Review Read More »

A Container Hacker’s Guide to Living Off of the Land

Sometimes as a pentester you find yourself in tricky situations. Depending on the type of engagement, you might want to try to avoid making a lot of noise on the network if possible. This blog post is going to talk about two techniques to use to gather information on your target while avoiding making too …

A Container Hacker’s Guide to Living Off of the Land Read More »

Scroll to Top