Skip to content
SecureLayer7
  • Home
  • Services
    • PENETRATION TESTING
      • Application Security
      • Mobile Application Security
      • Thick Client Penetration Testing
      • VoIP Penetration Testing
      • On Demand Penetration Testing
      • CODE AUDIT
      • Ethereum Smart Contract Audit
      • Source Code Audit
    • SECURITY EXPERTISE
      • IoT Device Security
      • ICO Security
      • Web Malware Removal
      • SAP Security Assessment
      • Red Team Assessment
      • CLOUD INFRASTRUCTURE
      • AWS Security Assessment
    • INFRASTRUCTURE SECURITY
      • Network Security
      • Server Hardening
      • Wireless Security Assessment
      • Firewall Configuration Review
      • Telecom Network Security
  • Resources
    • Resources
    • Advisories
  • Company
    • About
    • Management
    • Careers
  • Contact Us

Category: Knowledge-base

Category Archive
Mitigate OWASP Top 10 Android Risks with Static Analysis

Mitigate OWASP Top 10 Android Risks with Static Analysis

· July 12, 2024 · 11 min read

With the widespread use of mobile applications and the growing concern for mobile app security, it has become crucial for developers to ensure the integrity and security of their Android…

Read More
Webinar – Mobile app pen testing: Understanding android apps and how to secure them

Webinar – Mobile app pen testing: Understanding android apps and how to secure them

· January 21, 2022 · 2 min read

With 2.5 billion android users across 190 countries, the digital expansion offers limitless opportunities for businesses. But along with opportunities come the challenges that plague the digital world. The digital…

Read More
postMessage(): common issues and how you can mitigate them?

postMessage(): common issues and how you can mitigate them?

· December 22, 2021 · 9 min read

The window.postMessage() method, provided by the Window interface in web browsers, serves as a pivotal tool for enabling secure cross-origin communication between distinct browsing contexts. This method is instrumental in…

Read More
Websocket: common vulnerabilities plaguing it and managing them.

Websocket: common vulnerabilities plaguing it and managing them.

· December 17, 2021 · 4 min read

WebSockets allow the client/server to create a bidirectional communication channel. Then the client and server communicate asynchronously, and messages can be sent in either direction.

Read More
Sharpening your FRIDA scripting skills with Frida Tool

Sharpening your FRIDA scripting skills with Frida Tool

· November 19, 2021 · 8 min read

We can see a nice UI. In this application, there are 8 missions with minimal instructions provided. We can click on the check button after each attempt; if it changes…

Read More
Recon: an important part of penetration test for finding vulnerabilities

Recon: an important part of penetration test for finding vulnerabilities

· November 15, 2021 · 6 min read

Reconnaissance (aka Recon), a pen-testing process, is crucial in a Black Box Penetration test. A Recon is important for exploring an area to gather confidential information. A recon would provide…

Read More
Learn about Android WebView and its Vulnerabilities

Learn about Android WebView and its Vulnerabilities

· November 8, 2021 · 5 min read

Every android app must have an AndroidManifest.xml file that describes essential information—components, package name, apps permissions, hardware and software requirement— about the application. 

Read More
How do you set up an Active Directory in Windows

How do you set up an Active Directory in Windows

· October 28, 2021 · 3 min read

Hey guys, I hope you are doing well. Every Pentester is always keen on learning the Active directory. This article is about how we can set a basic Active directory…

Read More
Static Code Analysis: An important process for finding vulnerabilities

Static Code Analysis: An important process for finding vulnerabilities

· October 19, 2021 · 12 min read

Static code analysis analyses source code and identifies the bugs before the program is run. Vulnerabilities are identified in the source code through Static source code analysis (SSCA); Developers use…

Read More
Double-check Inputs to Avoid SSRF Vulnerability

Double-check Inputs to Avoid SSRF Vulnerability

· October 13, 2021 · 5 min read

Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain.

Read More

Posts pagination

Page 1 Page 2 Page 3 … Page 7 Next »

Recent Posts

  • ClawdBot VS Code Trojan Analysis and OpenClaw Security Risks
  • IPVanish VPN macOS Privilege Escalation – SecureLayer7
  • DeepChat openExternal RCE via XSS in Electron
  • OWASP A03: Software Supply Chain Failures Explained
  • A Deep Dive into CVE-2026-25049: n8n Remote Code Execution

Topics

  • Penetration Testing
  • Cybersecurity
  • Offensive Security
  • Web Application Security
  • API Security
  • Cloud Security
  • OWASP
  • Security Advisories
  • CVE Research
  • Knowledge Base
  • News

Quick Links

  • Home
  • About
  • Blog
  • Contact Us

About SecureLayer7

Leading offensive security firm offering penetration testing, API security scanning, and attack surface management. Learn more →

Services

  • Application Security
  • Network Security
  • Mobile Application Security
  • Thick Client Security

Security Topics

  • Penetration Testing
  • Offensive Security
  • Web Application Security
  • API Security
  • Cloud Security
  • OWASP
  • CVE Research
  • Security Advisories

Security Expertise

  • IoT Device Security
  • Red Teaming Assessment
  • VoIP Penetration Testing

Latest Articles

  • ClawdBot VS Code Trojan Analysis and OpenClaw Security Risks
  • IPVanish VPN macOS Privilege Escalation – SecureLayer7
  • DeepChat openExternal RCE via XSS in Electron
  • OWASP A03: Software Supply Chain Failures Explained

© 2026 SecureLayer7 – Offensive Security, API Scanner & Attack Surface Management — All rights reserved.