Knowledge base

NetCat shell upgrade

26 September 2022/by Jolijn

Social Engineering

27 September 2023/by Rene Koens

Preventing phishing attacks

27 September 2023/by Rene Koens

What is cross-site scripting (XXS)?

12 October 2023/by Rene Koens

What is cross-site request forgery (CSRF)?

12 October 2023/by Rene Koens

The Owasp Top 10

20 September 2022/by Jolijn

What is a mass-assignment attack?

23 September 2022/by Jolijn

What is path traversal?

26 September 2022/by Jolijn

Blind SQL Injection

26 September 2022/by Jolijn

What is Server-side request forgery (SSRF)?

26 September 2022/by Jolijn

CVE-2016-7941 – XSS in Netgear ProSAFE switches

26 September 2022/by Jolijn

Entity injection

26 September 2022/by Jolijn

What is clickjacking?

26 September 2022/by Jolijn

What is web application scanning?

26 September 2022/by Jolijn

The risk of .DS_Store

26 September 2022/by Jolijn

Tens of thousands of computer systems vulnerable to break-in

4 March 2024/by Rene Koens

NIS2 Guidelines: What companies need to know and how to comply

3 November 2023/by Jolijn

WannaCry: Anti-virus is not enough

15 May 2023/by cyberant

De Vattenfall case – Responsible Disclosure

16 August 2022/by Jolijn

Pentest vs Vulnerability Management

20 September 2022/by Jolijn

Ransomware: Anti-virus alone is not enough

23 September 2022/by Jolijn

User settings for AWS security audits

27 September 2023/by Rene Koens

The Network Security Check

27 September 2023/by Rene Koens

User settings for GCP security audits

25 September 2023/by Rene Koens

How does the CyberRisk work?

26 September 2022/by Jolijn