Triaxiom Security
Partner with us to meet your Information Security needs.
  • About Us
  • Services
    • Penetration Testing
    • Compliance Audit
    • Strategic Consulting
  • Blog
    • Penetration Test
    • PCI Compliance
    • Best Practice
  • Contact Us
What is the OSSTMM
2 Jul 2020

What is the OSSTMM?

The Open Source Security Testing Methodology Manual, or OSSTMM, was created to: …provide a scientific methodology for the accurate characterization of operational security (OpSec) through examination and correlation of test results in a consistent and reliable way. This manual is adaptable to almost any audit type, including penetration tests, ethical hacking, security assessments, vulnerability assessments, […]

file upload validation
30 Jun 2020

File Upload Validation Techniques

File upload filtering is an extremely important part of web application security that is also notoriously hard to get right. And unfortunately the stakes are high, as vulnerabilities associated with your file upload functionality can quickly turn into critical, exploitable issues with impacts that include remote code execution on the underlying web server. So let’s […]

IoT Devices in the Home
25 Jun 2020

IoT Devices in the Home

Today’s blog is just a quick update on home security. As a security professional, one of the most common questions I get from friends and family revolves around concerns they have from smart devices, or Internet of Things (IoT) devices, in their home. Should they be worried about their smart lock on their front door […]

Security Tips When Working From Home
23 Jun 2020

Security Tips When Working From Home

Currently and going forward, many employees may find themselves working from home temporarily or permanently. Security is still extremely important to yourself and your employer and today, we will explore tips and tricks that will help you maintain your security posture while working remotely. Working From Home Security Tips & Tricks Leverage a VPN – […]

methods of API authentication
11 Jun 2020

Most Common Methods of API Authentication

Today, we’re going to dig into the most common methods of API authentication out there and discuss some of the security implications associated with each of them, from the perspective of a penetration tester. As Application Programming Interfaces (APIs) continue to become a more prevalent tool used in website architecture, the security associated with them […]

coffee-1291656_1920
9 Jun 2020

An Introduction to Kerberoasting

In today’s blog, we will be taking a high-level look at a popular attack called Kerberoasting. Kerberoasting is used by attackers to escalate privileges once they gain initial access to an internal network. As penetration testers, we regularly use this attack vector during engagements and are generally successful in doing so. Let’s take a look […]

top reasons to become a penetration tester
4 Jun 2020

Top Reasons to Become a Penetration Tester

We are often times asked “why did you become a penetration tester” or “why should I get into penetration testing”? There are many different reasons to get into penetration testing and everyone is motivated by different things. We took a poll in our office of why our team members got into penetration testing and today […]

buffer overflow
2 Jun 2020

Introduction to Buffer Overflow Attacks

In today’s blog, we will be taking a very high-level look at buffer overflow attacks.  Attackers exploit buffer overflow vulnerabilities by overwriting the memory of an application. By doing so, an attacker can change the execution flow of the program, thereby instructing the program to execute code stored in an area of memory the attacker controls. Consider […]

COVID-19 Attack Surface Implications
29 May 2020

COVID-19 Attack Surface Implications

The COVID-19 pandemic has reshaped our organizations as we know them. For many, they have shifted from an on-site location to primarily working from home. What was first thought to be a few weeks, has now turned into a few months, and likely the impacts of this pandemic on your organization’s IT operations and procedures […]

JWTs
27 May 2020

Common Web Application Vulnerabilities – JWTs

We’ve been running across a lot of modern web applications lately that have implemented JSON Web Tokens (also known as JWTs) for session tracking. JWTs are an open, industry standard designed to securely transmit information between two parties as a cryptographically-signed, JSON object. While the JWT specification is designed generically to account for a variety […]

«‹ 8 9 10 11›»

Looking for something specific?

Recent Posts

  • web application penetration testingWeb Application Penetration Testing – A Beginner’s Guide
  • external penetration testWhat is an External Penetration Test?
  • why should you prepare for a penetration testWhy Should You Prepare for a Penetration Test?

Categories

Most Discussed

API Penetration Test Best Practice Checklist Cloud Common Vulnerabilities comparison COMPLIANCE configuration review Core Values Cost Current Events Education External Penetration Test firewall HIPAA improvement Incident Response Internal Penetration Test methodology Onsite Assessment Passphrase Passwords Password Security PCI PCI DSS PCI QSA penetration test Physical Penetration Test Problems QSA Quick Tips Regulation Remediation Report Risk ROC SAQ Security Awareness Small Business SMB Social Engineering vetting vulnerability Web Application Penetration Test wireless
Back to top
Triaxiom Security
© 2025 Triaxiom Security, a division of Strata Information Group, Inc. All rights reserved.
Privacy Policy