Oct 26, 2020 | Misconfiguration, Pentesting, Security, Vulnerabilities
While working with a client, VDA engineers encountered an interesting circumstance that allowed for the bypassing of Multi-factor Authentication for users that had already set this up on their accounts. This particular misconfiguration/vulnerability was possible due...
May 8, 2020 | AppSec, Pentesting, Security, Tool Development
Part of our internal mentoring and training culture at VDA includes Lunch and Learn events where engineers share helpful information about a relevant security topic. This past week, several of us discussed our favorite BurpSuite extensions, which are helpful additions...
Mar 9, 2020 | Graylog, Logging, Security
No More Secrets: Logging Made Easy Through Graylog Part 5 Logging is a important but often overlooked part of an organization’s security posture. Logging without organization, searchability, or reporting leads to data being missed. This a continuation of a longer...
Mar 2, 2020 | Graylog, Logging, Security
No More Secrets: Logging Made Easy Through Graylog Part 4 Logging is a important but often overlooked part of an organization’s security posture. Logging without organization, searchability, or reporting leads to data being missed. This a continuation of a...
Feb 26, 2020 | Graylog, Logging, Security
No More Secrets: Logging Made Easy Through Graylog Part 3 Logging is a important but often overlooked part of an organization’s security posture. Logging without organization, searchability, or reporting leads to data being missed. This a continuation of a...
Feb 21, 2020 | Graylog, Logging, Security, Tool Development, Training
No More Secrets: Logging Made Easy Through Graylog Part 2 Logging is a important but often overlooked part of an organization’s security posture. Logging without organization, searchability, or reporting leads to data being missed. This a continuation of a...