17 Mar Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security What is OWASP and Why Should You (as Someone Securing IoT) Care? January 15, 2024 By Richard Barrus If you’re charged with testing Internet of Things (IoT) devices or systems, we feel your pain. As the IoT explodes in diversity and com... Continue reading
12 Feb InfoSec Strategies | Category - Pivot Point Security How to Securely Implement Cross-Origin Resource Sharing (CORS) July 15, 2024 By Richard Barrus In recent web application assessments, I’ve found a number of client applications that have cross-origin resource sharing (CORS) vulne... Continue reading
10 Sep InfoSec Strategies | Category - Pivot Point Security How the Fiserv Application Vulnerability Validates a Strength of OWASP ASVS January 13, 2024 By Richard Barrus A recent security flaw in a financial technology application was discovered by a security researcher. The flaw illustrates a significan... Continue reading
03 Apr InfoSec Strategies | Category - Pivot Point Security File Inclusion Vulnerabilities and Defenses Against Them January 18, 2024 By Richard Barrus File inclusion vulnerabilities, including Remote File Inclusion (RFI) and Local File Inclusion (LFI) are most commonly found in web app... Continue reading
13 Feb InfoSec Strategies | Category - Pivot Point Security File Upload Vulnerabilities – How to Secure Your Upload Forms January 19, 2024 By Richard Barrus Enabling users to upload images, videos, documents and all manner of files is essential for many web applications, from social networki... Continue reading