Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.DEfO is developing an implementation of the Encrypted ClientHello (ECH) mechanism for OpenSSL. This effectively closes a privacy loophole in the Transport Layer Security protocol. Project Overview The DEfO project is developing an implementation …
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.We are thrilled to announce the return of the Free Pentest Contest for 2023: This is your chance to win a complimentary, professional pentest and fortify your defenses against cyber threats 100% for free, …
Compliance, Free Fix Verification, Free Free Pentest Contest, Free Pentest, ISO 27001, Mobile Application Security, Network Security, OWASP Top 10, Penetration Testing, Quality Guarantee, SOC2, Web Application Security
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.7ASecurity worked with Bridgefy to complete a whitebox pentest of the mobile app, SDK, cloud infrastructure, and privacy to help improve Bridgefy”s overall security posture. What is Bridgefy? Bridgefy, a popular mobile messaging app, …
Android, Bridgefy, cloud, Cloud Audit, iOS, messaging app, Mobile Application Security, Mobile Application Security Verification Standard, Mobile Security, Mobile Security Testing Guide, OWASP Application Security Verification Standard, OWASP Testing Guide, OWASP Top 10, Penetration Testing, Pentest, Security News, Web Security
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.This blog post summarizes a whitebox security review conducted by 7ASecurity against the ArgoVPN platform. What is ArgoVPN? ArgoVPN is a free VPN with an unlimited bandwidth that is developed for Android devices. It …
Android, ArgoVPN, Mobile Application Security, Mobile Application Security Verification Standard, Mobile Security, Mobile Security Testing Guide, OWASP Top 10, Penetration Testing, Pentest, Security News, VPN
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.7ASecurity had the privilege to collaborate with the Open Source Technology Improvement Fund (OSTIF), as well as the K-9 Mail and Thunderbird teams at Mozilla, in a recent security audit of the Mozilla K-9 Mail application. What is K-9 Mail? K-9 …
Android, K-9 Mail, Mobile Application Security, Mobile Security, Mozilla, Network Security, OSTIF, OWASP Top 10, Penetration Testing, Security News, Thunderbird, Web Application Security
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Get 50% off and become a cybersecurity ninja without breaking the bank. Seize the Summer Sale on all 7Asecurity Self-Paced Courses! Ready to level up your hacking skills? Visit our store store.7asecurity.com/discount/SUMMER50 and unlock …
cybersecurity, hacking, Hacking courses, Mobile Application Security, Network Security, OWASP Top 10, Penetration Testing, sale, Security Training, Training, Web Application Security
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.We are thrilled to announce the return of the Free Pentest Contest for 2023: This is your chance to win a complimentary, professional pentest and fortify your defenses against cyber threats 100% for free, …
Compliance, Free Fix Verification, Free Free Pentest Contest, Free Pentest, ISO 27001, Mobile Application Security, Network Security, OWASP Top 10, Penetration Testing, Quality Guarantee, SOC2, Web Application Security
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Are you testing MitM of an old protocol that starts using clear-text communications?You should consider spoofing server replies with some downgrade attack! This old trick still works sometimes against protocols that like:XMPP, SMTP, POP3 …
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Do you have doubts about the security of your applications and systems? This is not just necessary for compliance such as ISO 27001 or SOC2: As attackers continue to develop new methods to exploit …
Page 8: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.This blog post summarizes a whitebox security review conducted by 7ASecurity (an OTF Red Team Lab partner) against the implementation of the minivpn OpenVPN implementation. What is minivpn OpenVPN minivpn is a minimalistic OpenVPN implementation in Go (an …