After having run thousands of scans on Hackmetrix we can finally say we officially know the 10 most common vulnerabilities we’ve found across every site we scanned.
A medida que seguimos trabajando para crear el scanner de seguridad más fácil de utilizar y dev-friendly del mercado, de vez en cuando nos encontramos con cosas que nos hacen estar orgullosos no solo del producto que estamos desarrollando, sino también de cómo es reconocido por otros.
Let’s get the obvious part of this article out of the way first: if you don’t sanitize your data you’ll always be vulnerable to cross-site scripting (XSS) attacks, no matter what framework you use.
Most CTOs today have a software engineering background but have only limited knowledge about securing applications at scale.
What do we do?
If you are reading this, you’ve probably already heard about us, and in this post I do not want to talk about “Who we are” , instead I’d like to talk about How we check the Security Status of your company from the outside with almost no information other than your domain name.
We have entered the final stretch and we want to provide everyone in our community with an update on our progress and upcoming plans. Back in July we outlined a set of initiatives and have made significant progress on them since.
- A bug in the Google+ API left data like name, email address and gender of up to 500,000 users exposed
- Google patched the issue earlier this year and didn’t find any evidence of the data being misused
- This is the final nail in the coffin for Google+, which will be shut down by the end of 2019
In the past couple years we’ve seen a few giants either fall under scrutiny for how they’ve handled their user’s personal information –ahem-Facebook!-, or straight up had their user data held for ransom as was the case with Uber.
If you’ve been involved in software development in recent years, then you should be aware of the term “Penetration Testing”.
Our team continuously strives to improve the happiness and comfort of our customers. We are in charge of understanding developers’ challenges in searching to improve their software security without sacrificing development time, which is quite limited!