Menu

In 5 steps, I will show you how to find a remote code execution vulnerability in an unreleased version of the  German Covid-19 tracing app (CWA), using feedback-based fuzz testing.

Since the outbreak of the COVID-19 pandemic, tracing apps have been discussed in order to better...

We often get asked by customers if SQL injections are still an issue. Even though this...

Fuzzing is a powerful tool that finds bugs in programs. Hackers regularly use fuzzing to...

In recent years, modern fuzzing (feedback-based fuzzing) has uncovered a large number of bugs...

Get an overview of our testing platform by watching our demo video. 

 

Watch CI Fuzz Demo

 

Software bugs are far more relevant to costs than hardware errors. In fact, software failures...

Our latest release note comes with several new features for Java fuzzing and great improvements...

Executive Summary Software developers extend their existing frameworks and often write new...

What’s the Difference Between Both Testing Methods? During the last year, we went to many...

Our vulnerability researcher Sirko Höer recently found vulnerabilities while fuzzing the...

How Symbolic Execution Complements Modern Fuzzing What is Symbolic Execution?  Symbolic...

Automated Code Testing for Software Quality Assurance Quality assurance done through code...

Security of Java Applications Java is one of the most used programming languages in the...

Introduction to Testing Approaches In today's software testing industry acronyms like SAST, DAST...

Subscribe to our Newsletter!