Category: InfoSec

Threat Intelligence Sharing

Threat intelligence sharing is the practice of organisations exchanging information about cyber threats, such as new types of malware, phishing campaigns, or security vulnerabilities. By sharing details about attacks and indicators of compromise, organisations can help each other strengthen their defences and respond more quickly to threats. This collaboration can happen through trusted networks, industry…

Secure Software Development Lifecycle

The Secure Software Development Lifecycle, or SSDLC, is a process for building software with security in mind from the very beginning. It includes planning, designing, coding, testing, and maintaining software, ensuring that security checks and practices are part of each stage. By following SSDLC, teams aim to prevent security problems before they happen, rather than…

Side-Channel Attacks

Side-channel attacks are techniques used to gather information from a computer system by measuring physical effects during its operation, rather than by attacking weaknesses in algorithms or software directly. These effects can include timing information, power consumption, electromagnetic leaks, or even sounds made by hardware. Attackers analyse these subtle clues to infer secret data such…

Secure Session Management

Secure session management refers to the methods and practices used to keep user sessions safe when interacting with websites or applications. This includes creating, maintaining, and ending sessions in a way that prevents attackers from hijacking or impersonating users. Techniques such as using unique session identifiers, enforcing timeouts, and securely storing session data help protect…

Reverse Engineering

Reverse engineering is the process of taking apart a product, system, or software to understand how it works. This can involve analysing its structure, function, and operation, often with the goal of recreating or improving it. It is commonly used when original design information is unavailable or to check for security vulnerabilities.

Binary Exploitation

Binary exploitation is the practice of finding and taking advantage of weaknesses in computer programs at the machine code or binary level. Attackers use these vulnerabilities to change how a program behaves, often to gain unauthorised access or execute harmful commands. It often involves carefully crafted input that tricks a program into doing something it…

Dynamic Application Security Testing (DAST)

Dynamic Application Security Testing (DAST) is a method of testing the security of a running application by simulating attacks from the outside, just like a hacker would. It works by scanning the application while it is operating to find vulnerabilities such as broken authentication, insecure data handling, or cross-site scripting. DAST tools do not require…

Static Application Security Testing (SAST)

Static Application Security Testing (SAST) is a method used to find security flaws in software by analysing its source code, bytecode, or binary code without actually running the program. This process helps developers identify and fix vulnerabilities early in the development cycle, before the software is deployed. SAST tools scan the code for patterns that…

Fuzz Testing

Fuzz testing is a method used to find bugs or weaknesses in computer programmes by automatically feeding them random or unexpected data. The goal is to see how the software responds to unusual inputs and to check if it crashes, behaves oddly, or exposes security problems. This approach helps developers spot errors that might not…