Nigel MulhollandSecurity testing using Selenium and OWASP ZAPSecurity testing is an integral part of software testing, which is used to discover the weaknesses, risks, or threats in the software…May 8, 20222May 8, 20222
QAble Testlab Private LimitedWhat is Penetration Testing and How Does It Work?Penetration testing is also called pen-testing. Basically, it is a testing method that has been used to enhance the security of an…Feb 11, 2022Feb 11, 2022
InCWI SoftwarebyGabriel CartelliChecklist de Testes de Segurança para QAsTalvez você imagine que para executar testes de segurança é necessário ter incríveis habilidades hackers…Feb 7, 2022Feb 7, 2022
InLevel Up CodingbyTara Prasad RoutrayUnderstanding Cross-Origin Resource Sharing (CORS)Learn everything about cross-origin resource sharing (CORS), and how you can enable it in your applications.Dec 29, 2021Dec 29, 2021
InCypress.io ThailandbyShumnan SunCypress technique to bypass OAuth2 in RailsUse cypress-on-rails gem to mock and bypass authentication via App Command.Nov 26, 2021Nov 26, 2021
CareeristPenetration TestingA penetration test’s aim is to check the security processes of a tech system. In short, a penetration test is an orchestrated and…Dec 22, 2021Dec 22, 2021
InGovernment Digital Products, SingaporebyTeam MerlinBasic Web Security Testing — SessionsWhat if we tell you that ensuring only the application accuracy and performance are not enough? How about the “application security” piece?Oct 16, 2020Oct 16, 2020
Mah NoorDynamic Application Security Testing — DASTSecurity testing covers a wide range of testing activities and techniques from testing databases and back code to running scans on the…Jul 12, 2021Jul 12, 2021
Udara SembukuttiarachchiCan we automate a login with Two-factor authentication?That, my friends, is a question I had to answer in a Test Automation project I’ve been working on for a while. Our client is a very…Aug 28, 202110Aug 28, 202110
Srinithi VaratharajanHow to automate Multi-Factor Authentication(MFA) with Google Authenticator using SeleniumMulti-factor authentication (MFA) is used to add an extra security layer to the system so that they are less prone to vulnerabilities.Jul 12, 20211Jul 12, 20211
GeekenoAutomated Penetration Testing and How it works?As per late online protection reports, numerous sites are invaded day by day, and all of the seconds, another assault has endeavored. A…Jul 19, 2021Jul 19, 2021
Ramesh KhatriWeb Application VulnerabilitiesSome of the common web application vulnerabilities (SQL, XSS, LFI, Session Hijacking)Jul 8, 2021Jul 8, 2021