10 Sep InfoSec Strategies | Category - Pivot Point Security How the Fiserv Application Vulnerability Validates a Strength of OWASP ASVS January 13, 2024 By Richard Barrus A recent security flaw in a financial technology application was discovered by a security researcher. The flaw illustrates a significan... Continue reading
03 Apr InfoSec Strategies | Category - Pivot Point Security File Inclusion Vulnerabilities and Defenses Against Them January 18, 2024 By Richard Barrus File inclusion vulnerabilities, including Remote File Inclusion (RFI) and Local File Inclusion (LFI) are most commonly found in web app... Continue reading
27 Apr InfoSec Strategies | Category - Pivot Point Security Yes, You Should Secure Web Cookies with Secure Flags (Even with Applications that Operate Over SSL) January 19, 2024 By Taylor Smith Editor's Note: This post was originally published in April 2015 and has been updated for accuracy and comprehensiveness. “Web cookies.... Continue reading
14 Mar InfoSec Strategies | Category - Pivot Point Security A Quick Intro to the OWASP Application Security Verification Standard (ASVS) January 14, 2024 By Richard Barrus If you’re a web application developer or security professional, chances are you’ve heard at least a little about the OWASP Application ... Continue reading
24 Nov ISMS Consulting w3af: A Highly Effective, Open Source Web App Auditing and Exploitation Tool January 16, 2024 By Richard Barrus The Web Application Attack and Audit Framework (w3af) is an open source framework for auditing and exploitation of web applications. Fo... Continue reading