Penetration Testing

6 steps to defending your business with Incident Response

What are the phases of incident response and what are the key points within each? In this article we look at the 6 phases of incident response, to help you defend your business, in detail: Preparation Detection and Identification Containment Eradication Recovery Lessons learnt, Defining a ‘Cyber Incident’ The US Health Insurance Portability and Accountability […]

6 steps to defending your business with Incident Response Read More »

Penetration Testing

What’s wrong with having an internet facing login page? – SQL injection in Aptean

Exposing administrative interfaces can be dangerous – SQL injection in Aptean TLDR; We have found a time-based SQL injection in Aptean Product Configurator v4.0 SP6 – 4.61.0000 which allowed for database access. Have you ever wondered what are the risks of leaving a login interface exposed to the internet? You have probably already thought of weak

What’s wrong with having an internet facing login page? – SQL injection in Aptean Read More »