OWASP Top 10

OWASP Top 10: which are the main threats?

OWASP Top 10 The Open Web Application Security Project or OWASP , as we said in a previous article, is a not-for-profit organisation that aims at providing ‘best-in-class’ application security solutions. Their advices and tools are free, vendor neutral, unbiased yet practical. The organisation also lists the OWASP Top 10 web application security risks to help developers and system

OWASP

OWASP: Open Web Application Security Project

OWASP The Open Web Application Security Project or OWASP is a foundation that came into being on December 1, 2001. Basically, this foundation has a specific goal: improving software security. This not-for-profit organisation aims to provide unbiased, practical solutions to governments, organisations, educational institutes, trade organisations, groups, development organisations etc. OWASP offer tools and documents that have been

Cross site scripting

Cross site scripting: what do you need to know about it?

Cross site scripting Cross Site Scripting or XSS is a particular form of injection attack. Basically, attackers inject malicious scripts into a website. The attackers typically use web applications to transmit malicious codes, usually browser side scripts, to a different end user. In return, the web applications in a system generate output in response to the malicious input

Vulnerability Assessment

Vulnerability Assessment: introduction and explanation

Vulnerability Assessment A vulnerability assessment is something neccesary that leads the customer or the user to a full picture of the situation. It lets you know the exposure state of your systems to the vulnerabilities. In order to make it possible there are several automized tools. These tools run deep controls on each system or application and recognize

Equifax

Equifax data breach, Swascan explains what happened

Equifax data breach It should be easy for a victim to shut down the card, get new credentials and avoid losing money when a credit card is stolen. The real problem emerges with data that cannot be changed. Such as Social Security numbers or personal information. That is what happened in the recent cyber-attack that

Cybersecurity guide

Cybersecurity guide: looking for protection

Cybersecurity guide The recent cyber attacks that encrypted thousands of information denying companies their access has made thousands of headlines.  This has increased the value of cybersecurity companies ( see Cyber insurance ).  We need to clear the smoke with a cybersecurity guide that could help you. It is actually a good thing that companies are

Premio Cisco-Marzotto

Cybersecurity: Swascan wins Premio Cisco-Marzotto

The IT colossus chose Swascan (cybersecurity cloud platform) for the 2016 edition of the most important italian technologic competition. All of this started a process that lead the company to change its business approach, foresee go-to-market and build relationships with national and international companies. Working side by side with a corporation can help a startup sharpen and change its business approach