Shifting Left – The importance of implementing application Security Throughout the SDLC
Developers and students have to be told to pay attention to security Recent studies show that developers do not actively pay attention to the security

Developers and students have to be told to pay attention to security Recent studies show that developers do not actively pay attention to the security
XML external entity injection, also known as XXE attacks, is one of the most common security vulnerabilities in web applications, APIs, and microservices. It allows
We exhibited at Black Hat Europe, one of the Industry’s flagship events, drawing more than 3,000 Cyber Security professionals last week. This conference marked the
Blind SQL injections occur when a web application is exposed to SQL injection, but it’s HTTP responses don’t contain the results of the SQL query
Cross-site Request Forgery (CSRF/XSRF), also known as Sea Surf or Session Riding is a web security vulnerability that tricks a web browser into executing an
Last week NeuraLegion was honored to be one of a select group of Cybersecurity companies invited to participate in a road show organized by the
Implementing a DevSecOps process was never easier! CircleCI, a leader in cloud-native Continuous Integration, according to Forrester, and NeuraLegion, the maker of the world’s first
NeuraLegion is proud to announce and welcome Company’s new VP of R&D, Sijawusz Pur Rahnama. Sija has a wealth of experience gained from years of
Dynamic application security testing – DAST is one of the oldest automated application security testing techniques, it has been around since the mid-1990s. DAST solutions
The information age has advanced the way in which our society generates, stores and exchanges information. Hyperconnectivity, availability and business networking are great benefits of
SQL injections represent a code injection technique used to attack applications and the data they hold. They usually occur when user input is required, for
Why should security testing be implemented in the DevOps process? DevOps focuses on speedy completion of the development processes for faster delivery of products and
In the era referred to as ‘Industry 4.0’ or ‘The Fourth Industrial Revolution,’ two of the pillars of the technology field; automation and data transfer
DOM XSS stands for Document Object Model-based Cross-site Scripting. This kind of XSS attack occurs when an application receives some client-side JavaScript that processes data
Over the past few years, the development and deployment of microservices have become the leading method of application development. Unfortunately, security testing has not evolved
© 2021 NeuraLegion Ltd. All Rights Reserved