zlib audit by 7ASecurity
7ASecurity shares results of a holistic security audit of zlib: 10 security-impact findings (1 high) and all fixes verified, plus hardening recommendations and a custom threat model.
7ASecurity shares results of a holistic security audit of zlib: 10 security-impact findings (1 high) and all fixes verified, plus hardening recommendations and a custom threat model.
Noghteha engaged 7ASecurity for an independent Android security and privacy assessment strengthening an offline-first mesh messenger for high-risk connectivity.
Modern apps aren’t websites. They need the security to match; they need app penetration testing. Your user app connects to a mobile phone. It pulls data from the cloud. Routes through many APIs. It processes payments through third-party integrations. Each connection point is a possible gap. Each integration creates complexity. And complexity is where security …
A clear, practical walkthrough of the 7ASecurity audit process: threat-model driven scoping, a dedicated communication channel with interim findings, and free fix verification—so issues are fixed, not just reported.
For the past three years, the Tor Project has been working to improve the tools, resources, and protocols used to monitor the health of the Tor network. This work aims to strengthen the Tor network's resilience and resist relay attacks. As part of this effort, in July and August 2025, 7ASecurity conducted a code audit of those …
OWASP Executive Director Andrew van der Stock interviews 7ASecurity CEO Abraham Aranguren on what “quality pentesting” really means: threat-model driven scoping, researcher-led testing, interim findings, and free fix verification.
What Happens When the Threat Is Already Inside? Effective internal network penetration testing addresses a classic security fear, much like the line from horror films: 'The call is coming from inside the house'. In cybersecurity, this is a daily reality. While we spend a lot of time building strong walls to keep attackers out, many …
Protecting Your Data from Wireless Attacks Wireless network penetration testing is the most reliable way to verify that your office Wi-Fi is genuinely secure against invisible threats. Many businesses assume a password is enough protection, but hackers often bypass these basic hurdles with ease. If your wireless perimeter is weak, an attacker doesn’t need to …
The Free Pentest Contest is back for 2026 created for teams that need a realistic view of risk in production. We’re accepting applications for a limited number of organizations to receive a professional penetration test at no cost, focused on practical attack paths across SaaS applications, APIs, and internet-facing assets. If you’re a CTO, CISO, …
A Practical Approach to Stronger Defences Robust network penetration testing best practices are essential for protecting your business. Many organisations treat cybersecurity audits as a simple checklist, running a quick scan to satisfy a regulator. However, this approach leaves gaping holes that real attackers will exploit. To defend against sophisticated cybercriminals, you need a strategy …