Menu

In 5 steps, I will show you how to find a remote code execution vulnerability in an unreleased version of the  German Covid-19 tracing app (CWA), using feedback-based fuzz testing.

As the founder of Catena Cyber and a member of the Suricata development team, Philippe Antoine...

Securing APIs is many things, but not easy. With the increasing reliance on microservices and...

Let’s say you conduct a penetration test on a web application, and you find zero critical...

How to Prevent Downtime of Web Services, by Automating Your Security Testing. Developers Need to...

Get an overview of our testing platform by watching our demo video. 

 

Watch CI Fuzz Demo

 

Fuzz Testing is one of the most effective methods to find bugs and vulnerabilities in software....

Due to the new ISO/SAE 21434 many car manufacturers (OEMs) are expanding their software testing...

Abhishek Arya, who is currently Principal Software Engineer at Google, is one of the early...

Victor Marginean is currently leading the Security & Privacy for Human Interfaces Business Unit...

Christian Holler is Staff Security Engineer at Mozilla. Over the past ten years, he has gained...

As a pioneer in automotive cybersecurity, Thomas Wollinger has brought ESCRYPT from its...

Pentesting is an essential process to achieve good application security. There are many security...

Recently we released a blog article called “Are SQL Injections still a Thing?”. If you are...

Web Applications are growing increasingly complex, which makes tools for automated security...

The Rule of Ten states, that with each phase of a software development process a bug passes...

Subscribe to our Newsletter!