
What is Business Constraint Bypass
While security professionals pay significant attention to technical vulnerabilities such as SQL Injection, CSRF and Cross-Site Scripting, modern applications are just as susceptible to business
While security professionals pay significant attention to technical vulnerabilities such as SQL Injection, CSRF and Cross-Site Scripting, modern applications are just as susceptible to business
Bright’s ability to work with modern technology stacks and API security testing now includes full support for GraphQL APIs, enabling our customers to simplify, automate
Regardless of the maturity of your development and security processes / methodologies, integrating security testing automation into your API development pipelines is a struggle. With
Has your website been hacked? Don’t panic! We prepared a simple list of steps for you to follow to recover it. Even if your website
In our last post we talked about SAST solutions and why they are not always the best solution for AST. In this blog post, we
We at Bright are very proud to announce that we have been awarded the accredited certification on ISO 27701, the international standard on data privacy.
Intro Cross-site scripting (XSS) is an old but always relevant and dangerous type of attack that plagues almost all web applications, be it older or
Webomates, the leading global provider of Testing as a Service & Bright which provides a modern-day DAST solution enabling organizations to drive compliance on every
WordPress has many advantages and is not without reason the most popular way to build a website, with 60% of pages on the web based
The hotel giant Marriott confirmed a new data breach, this time involving the personal information of 5.2 million guests. According to an online notice that
Microsoft warned billions of Windows users of two critical 0-day vulnerabilities in all currently supported versions of Microsoft Windows, both server and desktop. These vulnerabilities
Last week I attended my first RSA Conference in San Francisco representing Bright. I wanted to share my impressions and thoughts as a first-timer at
In the first part of the LDAP Injections blog, we talked about the basics. The definition of LDAP Services, how they get exploited, and what
The use of microservices results in many new, open and vulnerable connections. Microservices expose endpoints which are usually referred to as APIs to the public.
Do you know what “skimming” is? It’s a method that hackers use to gather sensitive information in online payment forums. Credit card numbers, email addresses,
© 2022 Bright Security Inc. All Rights Reserved