Skip to main content

Pentest Chronicles

If you’re interested in the world of cybersecurity, the related technical issues, and what’s challenging right now, you’re in the right place! This part talks about IT security more broadly and has the latest information, tips, and advice.
Illustration of Pentest Chronicles

Latest insight

Other articles

Illustration of How Private Cache Can Lead to Mass Account Takeover – pentest case

How Private Cache Can Lead to Mass Account Takeover – pentest case

MATEUSZ KOWALCZYK

In many situations, minor vulnerabilities might seem like small fish in the vast ocean of cybersecurity threats. They're often marked as low severity and thus, overlooked by developers who assume that the conditions for their exploitation are too complicated to be met. However, in this article, we're going to challenge that assumption and show you how chaining several 'minor' vulnerabilities can lead to a Mass Account Takeover.

READ article
Illustration of When Usernames Become Passwords: A Real-World Case Study of Weak Password Practices

When Usernames Become Passwords: A Real-World Case Study of Weak Password Practices

michał wnękowicz

In today's world, ensuring the security of our accounts is more crucial than ever. Just as keys protect the doors to our homes, passwords serve as the first line of defense for our data and assets. It's easy to assume that technical individuals, such as developers and IT professionals, always use strong, unique passwords to keep their accounts secure. However, this is not always the case; for example, ...

READ article
A professional cybersecurity consultant ready to assist with your inquiry.

Any questions?

Happy to get a call or email
and help!