There are a lot of companies selling penetration tests (pen tests), but how do you know if what you are…
Application
You may have seen the OWASP® Top 10 on our site or around the web and are wondering what it…
If you think the Rules of Engagement sound like a war movie, you’re not alone. In the penetration testing world,…
Conducting pen tests might seem easy enough, with the right tools and some YouTube videos. Sure, you can do the…
In speaking with many of our clients, MainNerve’s staff has fielded countless questions about the type of penetration testing and…
Are you properly testing your Web Application Security? According to a report from Imperva, the number of new web application…
An authentication bypass attack could allow a hacker to steal sensitive data. It could also compromise your server and even…
While cross-origin resource sharing (CORS) is a great way to enable open access across domain boundaries, it’s critical to test…
Cross-site scripting can severely compromise your network security and your company reputation. The most severe XSS (cross-site scripting) attacks allow…