by Ryan Hanson | Security
Recently I’ve been spending a lot of time looking into the vulnerabilities happening with some AngularJS implementations. The biggest problem being: mixing server side templates with client side templates. This opens up the opportunity for user input to get into...
by Robbie Richards | Security
“In today’s environment, the core of any security strategy needs to shift from breach prevention to breach acceptance.” – Gemalto, data security firm Data breaches cost the US healthcare industry over $6 billion a year. In the last two years,...
by Ryan Hanson | Security
The Penetration Testing with Kali Linux course and the Offensive Security Certified Professional (OSCP) certification was created to not only teach, but also prove someone has the core skills required to do a penetration test. Both the course and the certification...
by Ryan Hanson | Security
Do you click links in emails from people (or companies) you trust? Of course you do. Everybody with a computer does it every day, without a second a thought. But… This routine activity provides a gateway for malicious hackers to take control of your computer. By...
by Ryan Hanson | Security
Being hacked is never viewed as a good thing. Nobody likes their data being stolen and leaked. Nobody actually wants to be hacked, or do they? The past has shown that after a company is hacked their security awareness increases and overall security actually gets...