Help
RSS
API
Feed
Maltego
Contact
Domain > blog.secuna.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-04-24
104.26.5.72
(
ClassC
)
2024-12-04
104.26.10.183
(
ClassC
)
2025-10-09
172.67.68.52
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Thu, 09 Oct 2025 23:29:52 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveServer: cloudflareNel: {report_to:cf-nel,success_fraction:0.0,max_age:604800}X-Powered-By: ExpressCache-Control: public, max-age0X-Content-Type-Options: nosniffVary: Accept-EncodingReport-To: {group:cf-nel,max_age:604800,endpoints:{url:https://a.nel.cloudflare.com/report/v4?s76sTx6VWGxQmSiglWwoumEp%2BChT4lSui305t6O5GXBwdpzfmWzxKbX%2F4O9tyWx9Vs017trGsw8F0jcIybtP70Y9bI5NoMfCpLF3Kjw%3D%3D}}cf-cache-status: DYNAMICStrict-Transport-Security: max-age15552000; includeSubDomains; preloadCF-RAY: 98c1a99a4caaff13-PDXalt-svc: h3:443; ma86400 !DOCTYPE html>html langen>head> meta charsetutf-8 /> meta http-equivX-UA-Compatible contentIEedge /> title>Security First - News, Research, Events, Updates | Secuna/title> meta nameHandheldFriendly contentTrue /> meta nameviewport contentwidthdevice-width, initial-scale1.0 /> link relstylesheet typetext/css href/assets/built/screen.css?v21dbded237 /> meta namedescription contentSee the latest cybersecurity news, research, events, and updates from the team at Secuna. Secuna is the first and only cybersecurity testing platform for Startups and SMEs /> link relshortcut icon href/favicon.png typeimage/png /> link relcanonical hrefhttps://blog.secuna.io/ /> meta namereferrer contentno-referrer-when-downgrade /> link relnext hrefhttps://blog.secuna.io/page/2/ /> meta propertyog:site_name contentSecurity First - News, Research, Events, Updates | Secuna /> meta propertyog:type contentwebsite /> meta propertyog:title contentSecurity First - News, Research, Events, Updates | Secuna /> meta propertyog:description contentSee the latest cybersecurity news, research, events, and updates from the team at Secuna. Secuna is the first and only cybersecurity testing platform for Startups and SMEs /> meta propertyog:url contenthttps://blog.secuna.io/ /> meta propertyog:image contenthttps://blog.secuna.io/content/images/2023/11/FACEBOOK-HEADER.png /> meta propertyarticle:publisher contenthttps://www.facebook.com/secuna.io /> meta nametwitter:card contentsummary_large_image /> meta nametwitter:title contentSecurity First - News, Research, Events, Updates | Secuna /> meta nametwitter:description contentSee the latest cybersecurity news, research, events, and updates from the team at Secuna. Secuna is the first and only cybersecurity testing platform for Startups and SMEs /> meta nametwitter:url contenthttps://blog.secuna.io/ /> meta nametwitter:image contenthttps://blog.secuna.io/content/images/2023/11/FACEBOOK-HEADER-1.png /> meta nametwitter:site content@secunasecurity /> meta propertyog:image:width content1500 /> meta propertyog:image:height content565 /> script typeapplication/ld+json>{ @context: https://schema.org, @type: WebSite, publisher: { @type: Organization, name: Security First - News, Research, Events, Updates | Secuna, url: https://blog.secuna.io/, logo: { @type: ImageObject, url: https://blog.secuna.io/content/images/2022/06/secuna-white.png } }, url: https://blog.secuna.io/, image: { @type: ImageObject, url: https://blog.secuna.io/content/images/2020/04/BLOG-HEADER-03.png, width: 2000, height: 484 }, mainEntityOfPage: { @type: WebPage, @id: https://blog.secuna.io/ }, description: See the latest cybersecurity news, research, events, and updates from the team at Secuna. Secuna is the first and only cybersecurity testing platform for Startups and SMEs} /script> meta namegenerator contentGhost 3.12 /> link relalternate typeapplication/rss+xml titleSecurity First - News, Research, Events, Updates | Secuna hrefhttps://blog.secuna.io/rss/ /> meta propertyfb:app_id content591401525033252 />meta nametwitter:site content@secunasecurity>!-- Global site tag (gtag.js) - Google Analytics -->!--script async srchttps://www.googletagmanager.com/gtag/js?idUA-148216919-1>/script>script> window.dataLayer window.dataLayer || ; function gtag(){dataLayer.push(arguments);} gtag(js, new Date()); gtag(config, UA-148216919-1);/script>-->!-- Google tag (gtag.js) -->script async srchttps://www.googletagmanager.com/gtag/js?idG-W2BPEFVC46>/script>script> window.dataLayer window.dataLayer || ; function gtag(){dataLayer.push(arguments);} gtag(js, new Date()); gtag(config, G-W2BPEFVC46);/script>script srchttps://config.metomic.io/config.js?idprj:cc175a67-de8c-4f92-92e0-d993b9539b5c crossorigin charsetutf-8>/script>script srchttps://consent-manager.metomic.io/embed.js crossorigin charsetutf-8>/script>/head>body classhome-template> div classsite-wrapper> header classsite-home-header> style typetext/css> .responsive-header-img { background-image: url(/content/images/size/w2000/2020/04/BLOG-HEADER-03.png); } @media(max-width: 1000px) { .responsive-header-img { background-image: url(/content/images/size/w1000/2020/04/BLOG-HEADER-03.png); background-image: -webkit-image-set(url(/content/images/size/w1000/2020/04/BLOG-HEADER-03.png) 1x, url(/content/images/size/w2000/2020/04/BLOG-HEADER-03.png) 2x); background-image: image-set(url(/content/images/size/w1000/2020/04/BLOG-HEADER-03.png) 1x, url(/content/images/size/w2000/2020/04/BLOG-HEADER-03.png) 2x); } } @media(max-width: 600px) { .responsive-header-img { background-image: url(/content/images/size/w600/2020/04/BLOG-HEADER-03.png); background-image: -webkit-image-set(url(/content/images/size/w600/2020/04/BLOG-HEADER-03.png) 1x, url(/content/images/size/w1000/2020/04/BLOG-HEADER-03.png) 2x); background-image: image-set(url(/content/images/size/w600/2020/04/BLOG-HEADER-03.png) 1x, url(/content/images/size/w1000/2020/04/BLOG-HEADER-03.png) 2x); } }/style>div classouter site-header-background responsive-header-img> div classinner> nav classsite-nav> div classsite-nav-left-wrapper> div classsite-nav-left> a classsite-nav-logo hrefhttps://www.secuna.io/>img src/content/images/2022/06/secuna-white.png altSecurity First - News, Research, Events, Updates | Secuna />/a> div classsite-nav-content> ul classnav rolemenu> li classnav-home nav-current rolemenuitem>a hrefhttps://blog.secuna.io/>Home/a>/li> li classnav-news rolemenuitem>a hrefhttps://blog.secuna.io/tag/secuna-newsroom/>News/a>/li> li classnav-research rolemenuitem>a hrefhttps://blog.secuna.io/tag/research/>Research/a>/li> li classnav-events rolemenuitem>a hrefhttps://blog.secuna.io/tag/events/>Events/a>/li> li classnav-updates rolemenuitem>a hrefhttps://blog.secuna.io/tag/updates/>Updates/a>/li> li classnav-tips-tricks rolemenuitem>a hrefhttps://blog.secuna.io/tag/tips-and-tricks/>Tips & Tricks/a>/li> li classnav-vulnerabilities rolemenuitem>a hrefhttps://blog.secuna.io/tag/vulnerabilities-and-testing/>Vulnerabilities/a>/li>/ul> /div> /div> /div> div classsite-nav-right> div classsocial-links> a classsocial-link social-link-fb hrefhttps://www.facebook.com/secuna.io titleFacebook target_blank relnoopener>svg viewBox0 0 32 32 xmlnshttp://www.w3.org/2000/svg>path dM16 0c8.837 0 16 7.163 16 16s-7.163 16-16 16S0 24.837 0 16 7.163 0 16 0zm5.204 4.911h-3.546c-2.103 0-4.443.885-4.443 3.934.01 1.062 0 2.08 0 3.225h-2.433v3.872h2.509v11.147h4.61v-11.22h3.042l.275-3.81h-3.397s.007-1.695 0-2.187c0-1.205 1.253-1.136 1.329-1.136h2.054V4.911z />/svg>/a> a classsocial-link social-link-tw hrefhttps://twitter.com/secunasecurity titleTwitter target_blank relnoopener>svg xmlnshttp://www.w3.org/2000/svg viewBox0 0 32 32>path dM30.063 7.313c-.813 1.125-1.75 2.125-2.875 2.938v.75c0 1.563-.188 3.125-.688 4.625a15.088 15.088 0 0 1-2.063 4.438c-.875 1.438-2 2.688-3.25 3.813a15.015 15.015 0 0 1-4.625 2.563c-1.813.688-3.75 1-5.75 1-3.25 0-6.188-.875-8.875-2.625.438.063.875.125 1.375.125 2.688 0 5.063-.875 7.188-2.5-1.25 0-2.375-.375-3.375-1.125s-1.688-1.688-2.063-2.875c.438.063.813.125 1.125.125.5 0 1-.063 1.5-.25-1.313-.25-2.438-.938-3.313-1.938a5.673 5.673 0 0 1-1.313-3.688v-.063c.813.438 1.688.688 2.625.688a5.228 5.228 0 0 1-1.875-2c-.5-.875-.688-1.813-.688-2.75 0-1.063.25-2.063.75-2.938 1.438 1.75 3.188 3.188 5.25 4.25s4.313 1.688 6.688 1.813a5.579 5.579 0 0 1 1.5-5.438c1.125-1.125 2.5-1.688 4.125-1.688s3.063.625 4.188 1.813a11.48 11.48 0 0 0 3.688-1.375c-.438 1.375-1.313 2.438-2.563 3.188 1.125-.125 2.188-.438 3.313-.875z/>/svg>/a> /div> a classrss-button hrefhttps://feedly.com/i/subscription/feed/https://blog.secuna.io/rss/ titleRSS target_blank relnoopener>svg xmlnshttp://www.w3.org/2000/svg viewBox0 0 24 24>circle cx6.18 cy17.82 r2.18/>path dM4 4.44v2.83c7.03 0 12.73 5.7 12.73 12.73h2.83c0-8.59-6.97-15.56-15.56-15.56zm0 5.66v2.83c3.9 0 7.07 3.17 7.07 7.07h2.83c0-5.47-4.43-9.9-9.9-9.9z/>/svg>/a> /div>/nav> div classsite-header-content> h2 classsite-description>Protecting Organizations Through Collaboration/h2> /div> /div> /div>/header>main idsite-main classsite-main outer> div classinner posts> div classpost-feed> article classpost-card post tag-ethical-hacking tag-hunters tag-pentest tag-pentesting tag-secuna tag-tips-and-tricks tag-tactics tag-techniques tag-ttt tag-understanding-cybersecurity tag-vapt tag-vulnerabilities tag-vulnerabilities-and-testing tag-white-hats tag-advanced-techniques-for-hunters tag-hunting-techniques post-card-large> a classpost-card-image-link href/advanced-bug-hunting-techniques-expanding-your-skillset-for-2025/> img classpost-card-image srcset/content/images/size/w300/2025/02/Frame-23.png 300w, /content/images/size/w600/2025/02/Frame-23.png 600w, /content/images/size/w1000/2025/02/Frame-23.png 1000w, /content/images/size/w2000/2025/02/Frame-23.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2025/02/Frame-23.png altAdvanced Bug Hunting Techniques: Expanding Your Skillset for 2025 /> /a> div classpost-card-content> a classpost-card-content-link href/advanced-bug-hunting-techniques-expanding-your-skillset-for-2025/> header classpost-card-header> div classpost-card-primary-tag>Ethical Hacking/div> h2 classpost-card-title>Advanced Bug Hunting Techniques: Expanding Your Skillset for 2025/h2> /header> section classpost-card-excerpt> p>Bug Bounty Hunting and Penetration Testing have evolved dramatically, with security landscapes constantly shifting as attackers and defenders adapt to new technologies and strategies. What once worked in traditional security/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2025-02-25>25 Feb 2025/time> span classbull>•/span> 5 min read/span> /div> /footer> /div>/article> article classpost-card post tag-getting-started tag-pentest tag-pentesting tag-proactive-cybersecurity tag-secuna tag-understanding-cybersecurity tag-vapt tag-vulnerabilities-and-testing tag-vulnerabilities tag-cybersecurity-mistakes-businesses-must-avoid tag-common-cyber-threats-that-put-businesses-at-risk tag-why-cybersecurity-is-essential-for-every-business tag-cybersecurity-basics-every-business-should-know tag-first-steps-to-strengthen-your-business-security > a classpost-card-image-link href/cybersecurity-basics-every-business-should-know-a-beginners-guide/> img classpost-card-image srcset/content/images/size/w300/2025/02/Frame-4.png 300w, /content/images/size/w600/2025/02/Frame-4.png 600w, /content/images/size/w1000/2025/02/Frame-4.png 1000w, /content/images/size/w2000/2025/02/Frame-4.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2025/02/Frame-4.png altCybersecurity Basics Every Business Should Know: A Beginner’s Guide /> /a> div classpost-card-content> a classpost-card-content-link href/cybersecurity-basics-every-business-should-know-a-beginners-guide/> header classpost-card-header> div classpost-card-primary-tag>Getting Started/div> h2 classpost-card-title>Cybersecurity Basics Every Business Should Know: A Beginner’s Guide/h2> /header> section classpost-card-excerpt> p>Why Cybersecurity is Essential for Every BusinessJust as trust strengthens relationships, robust security is essential for a thriving business. With cyber threats continuously advancing, companies of all sizes must stay/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2025-02-11>11 Feb 2025/time> span classbull>•/span> 6 min read/span> /div> /footer> /div>/article> article classpost-card post tag-cybersecurity-wrapped tag-cybersercurity-news tag-general tag-pentest tag-pentesting tag-proactive-cybersecurity tag-secuna tag-techniques tag-tips-and-tricks tag-ttt tag-understanding-cybersecurity tag-ethical-hacking tag-hunters tag-white-hats > a classpost-card-image-link href/ethical-hacking-in-2024-a-year-in-review/> img classpost-card-image srcset/content/images/size/w300/2025/01/32.png 300w, /content/images/size/w600/2025/01/32.png 600w, /content/images/size/w1000/2025/01/32.png 1000w, /content/images/size/w2000/2025/01/32.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2025/01/32.png altEthical Hacking in 2024: A Year in Review /> /a> div classpost-card-content> a classpost-card-content-link href/ethical-hacking-in-2024-a-year-in-review/> header classpost-card-header> div classpost-card-primary-tag>Cybersecurity Wrapped/div> h2 classpost-card-title>Ethical Hacking in 2024: A Year in Review/h2> /header> section classpost-card-excerpt> p>Reflecting on the cybersecurity landscape of 2024, ethical hackers emerge as pivotal figures in the fight against ever-evolving digital threats. Often referred to as “white hats” or “hunters,” these professionals/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2025-01-28>28 Jan 2025/time> span classbull>•/span> 5 min read/span> /div> /footer> /div>/article> article classpost-card post tag-general tag-understanding-cybersecurity tag-secuna tag-updates tag-vulnerabilities tag-vulnerabilities-and-testing tag-cybersercurity-news tag-cybersecurity-wrapped tag-high-profile-cyberattacks tag-proactive-cybersecurity tag-techniques tag-tactics tag-ttt featured > a classpost-card-image-link href/looking-back-to-move-forward-key-cybersecurity-takeaways-from-2024-2/> img classpost-card-image srcset/content/images/size/w300/2025/01/Frame-4.png 300w, /content/images/size/w600/2025/01/Frame-4.png 600w, /content/images/size/w1000/2025/01/Frame-4.png 1000w, /content/images/size/w2000/2025/01/Frame-4.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2025/01/Frame-4.png altLooking Back to Move Forward: Key Cybersecurity Takeaways from 2024 /> /a> div classpost-card-content> a classpost-card-content-link href/looking-back-to-move-forward-key-cybersecurity-takeaways-from-2024-2/> header classpost-card-header> div classpost-card-primary-tag>General/div> h2 classpost-card-title>Looking Back to Move Forward: Key Cybersecurity Takeaways from 2024/h2> /header> section classpost-card-excerpt> p>As we move further into 2025, it’s essential to look back at the cybersecurity landscape of 2024. This past year was marked by high-profile breaches, rapid technological advancements, and/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2025-01-15>15 Jan 2025/time> span classbull>•/span> 5 min read/span> /div> /footer> /div>/article> article classpost-card post tag-customer-stories-case-studies tag-secuna tag-pentesting tag-pentest tag-vapt tag-edtech tag-understanding-cybersecurity tag-vulnerabilities-and-testing > a classpost-card-image-link href/uniting-education-technology-and-cybesecurity-secuna-and-codechums-collaboration/> img classpost-card-image srcset/content/images/size/w300/2024/10/Frame-8.png 300w, /content/images/size/w600/2024/10/Frame-8.png 600w, /content/images/size/w1000/2024/10/Frame-8.png 1000w, /content/images/size/w2000/2024/10/Frame-8.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2024/10/Frame-8.png altUniting Education Technology and Cybersecurity: Secuna and CodeChum's Collaboration /> /a> div classpost-card-content> a classpost-card-content-link href/uniting-education-technology-and-cybesecurity-secuna-and-codechums-collaboration/> header classpost-card-header> div classpost-card-primary-tag>Customer Stories & Case Studies/div> h2 classpost-card-title>Uniting Education Technology and Cybersecurity: Secuna and CodeChum's Collaboration/h2> /header> section classpost-card-excerpt> p>Introducing CodeChumLaunched just two years ago, CodeChum has made significant strides in bridging the gap between academia and tech industry. With partnerships across 70 schools and a growing user base/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2024-10-14>14 Oct 2024/time> span classbull>•/span> 5 min read/span> /div> /footer> /div>/article> article classpost-card post tag-customer-stories-case-studies tag-secuna tag-vulnerabilities-and-testing featured > a classpost-card-image-link href/lista-ph-commitment-to-cybersecurity-with-secuna/> img classpost-card-image srcset/content/images/size/w300/2024/02/Frame-4-3.png 300w, /content/images/size/w600/2024/02/Frame-4-3.png 600w, /content/images/size/w1000/2024/02/Frame-4-3.png 1000w, /content/images/size/w2000/2024/02/Frame-4-3.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2024/02/Frame-4-3.png altLISTA PH'S COMMITMENT TO CYBERSECURITY WITH SECUNA /> /a> div classpost-card-content> a classpost-card-content-link href/lista-ph-commitment-to-cybersecurity-with-secuna/> header classpost-card-header> div classpost-card-primary-tag>Customer Stories & Case Studies/div> h2 classpost-card-title>LISTA PH'S COMMITMENT TO CYBERSECURITY WITH SECUNA/h2> /header> section classpost-card-excerpt> p>Introducing LISTA PH Empowering a thriving community of over 1 million users to achieve their financial aspirations, Lista has transformed the Filipino landscape of financial management since its grand debut/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2024-02-22>22 Feb 2024/time> span classbull>•/span> 4 min read/span> /div> /footer> /div>/article> article classpost-card post post-card-large> a classpost-card-image-link href/vapt-your-guide-to-an-enhanced-cybersecurity/> img classpost-card-image srcset/content/images/size/w300/2023/12/SECUNA-PENTEST-1.png 300w, /content/images/size/w600/2023/12/SECUNA-PENTEST-1.png 600w, /content/images/size/w1000/2023/12/SECUNA-PENTEST-1.png 1000w, /content/images/size/w2000/2023/12/SECUNA-PENTEST-1.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2023/12/SECUNA-PENTEST-1.png altSecuna Pentest: Your Guide to an Enhanced Cybersecurity /> /a> div classpost-card-content> a classpost-card-content-link href/vapt-your-guide-to-an-enhanced-cybersecurity/> header classpost-card-header> h2 classpost-card-title>Secuna Pentest: Your Guide to an Enhanced Cybersecurity/h2> /header> section classpost-card-excerpt> p>Navigating the Digital Ages Cyber ChallengesIn todays tech-filled world, the surge of cyber threats poses significant risks to individuals, organizations, and even entire nations. As our dependence on wireless networks/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2023-12-21>21 Dec 2023/time> span classbull>•/span> 4 min read/span> /div> /footer> /div>/article> article classpost-card post tag-vulnerabilities-and-testing featured > a classpost-card-image-link href/secuna-response-program-customization/> img classpost-card-image srcset/content/images/size/w300/2023/12/Frame-4432.png 300w, /content/images/size/w600/2023/12/Frame-4432.png 600w, /content/images/size/w1000/2023/12/Frame-4432.png 1000w, /content/images/size/w2000/2023/12/Frame-4432.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2023/12/Frame-4432.png altSecuna Response Program Customization /> /a> div classpost-card-content> a classpost-card-content-link href/secuna-response-program-customization/> header classpost-card-header> div classpost-card-primary-tag>Vulnerabilities and Testing/div> h2 classpost-card-title>Secuna Response Program Customization/h2> /header> section classpost-card-excerpt> p>Every organization, though sharing an industry, carries its own unique identity shaped by its vision, mission, and core values. This individuality is further defined by industry nuances and distinct assets/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2023-12-06>6 Dec 2023/time> span classbull>•/span> 4 min read/span> /div> /footer> /div>/article> article classpost-card post tag-secuna tag-understanding-cybersecurity featured > a classpost-card-image-link href/how-does-secuna-response-work/> img classpost-card-image srcset/content/images/size/w300/2023/11/Frame-13.png 300w, /content/images/size/w600/2023/11/Frame-13.png 600w, /content/images/size/w1000/2023/11/Frame-13.png 1000w, /content/images/size/w2000/2023/11/Frame-13.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2023/11/Frame-13.png altHow does Secuna Response Work? /> /a> div classpost-card-content> a classpost-card-content-link href/how-does-secuna-response-work/> header classpost-card-header> div classpost-card-primary-tag>Secuna/div> h2 classpost-card-title>How does Secuna Response Work?/h2> /header> section classpost-card-excerpt> p>In todays interconnected world, the continuously evolving technology offers us convenience in our daily lives but it is significant to acknowledge that it also presents us with various threats in/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Amby Marielle Masiglat /div> a href/author/amby/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2023/09/IMG_0919.jpg altAmby Marielle Masiglat /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/amby/>Amby Marielle Masiglat/a>/span> span classpost-card-byline-date>time datetime2023-11-21>21 Nov 2023/time> span classbull>•/span> 2 min read/span> /div> /footer> /div>/article> article classpost-card post tag-customer-stories-case-studies > a classpost-card-image-link href/securing-the-best-payment-gateway-in-the-philippines-dragonpay-case-study/> img classpost-card-image srcset/content/images/size/w300/2022/07/v4.jpg 300w, /content/images/size/w600/2022/07/v4.jpg 600w, /content/images/size/w1000/2022/07/v4.jpg 1000w, /content/images/size/w2000/2022/07/v4.jpg 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2022/07/v4.jpg altSecuring The Best Payment Gateway in the Philippines - Dragonpay Case Study /> /a> div classpost-card-content> a classpost-card-content-link href/securing-the-best-payment-gateway-in-the-philippines-dragonpay-case-study/> header classpost-card-header> div classpost-card-primary-tag>Customer Stories & Case Studies/div> h2 classpost-card-title>Securing The Best Payment Gateway in the Philippines - Dragonpay Case Study/h2> /header> section classpost-card-excerpt> p>Dragonpay is the pioneer in alternative online payments in the Philippines giving access to customers to purchase goods or services online and pay for them using cash at physical, brick-and-mortar/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2022-07-05>5 Jul 2022/time> span classbull>•/span> 1 min read/span> /div> /footer> /div>/article> article classpost-card post tag-customer-stories-case-studies > a classpost-card-image-link href/dashlabs-embraces-community-of-ethical-and-trusted-hackers-to-secure-its-platform/> img classpost-card-image srcset/content/images/size/w300/2022/06/dashlabs-case-study-landscape-v2.jpg 300w, /content/images/size/w600/2022/06/dashlabs-case-study-landscape-v2.jpg 600w, /content/images/size/w1000/2022/06/dashlabs-case-study-landscape-v2.jpg 1000w, /content/images/size/w2000/2022/06/dashlabs-case-study-landscape-v2.jpg 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2022/06/dashlabs-case-study-landscape-v2.jpg altDASHLABS EMBRACES COMMUNITY OF ETHICAL AND TRUSTED HACKERS TO SECURE ITS PLATFORM /> /a> div classpost-card-content> a classpost-card-content-link href/dashlabs-embraces-community-of-ethical-and-trusted-hackers-to-secure-its-platform/> header classpost-card-header> div classpost-card-primary-tag>Customer Stories & Case Studies/div> h2 classpost-card-title>DASHLABS EMBRACES COMMUNITY OF ETHICAL AND TRUSTED HACKERS TO SECURE ITS PLATFORM/h2> /header> section classpost-card-excerpt> p>Client BackgroundDashlabs.ai is a Y Combinator-funded company that started out as a volunteer effort to help combat the pandemic. Its lab software now powers the Philippine Red Cross, helping/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2022-06-02>2 Jun 2022/time> span classbull>•/span> 2 min read/span> /div> /footer> /div>/article> article classpost-card post tag-customer-stories-case-studies > a classpost-card-image-link href/twala-tightens-its-security-posture-with-secuna-pentest/> img classpost-card-image srcset/content/images/size/w300/2022/03/photo_2022-02-09_16-18-20.jpg 300w, /content/images/size/w600/2022/03/photo_2022-02-09_16-18-20.jpg 600w, /content/images/size/w1000/2022/03/photo_2022-02-09_16-18-20.jpg 1000w, /content/images/size/w2000/2022/03/photo_2022-02-09_16-18-20.jpg 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2022/03/photo_2022-02-09_16-18-20.jpg altTWALA TIGHTENS ITS SECURITY POSTURE WITH SECUNA PENTEST /> /a> div classpost-card-content> a classpost-card-content-link href/twala-tightens-its-security-posture-with-secuna-pentest/> header classpost-card-header> div classpost-card-primary-tag>Customer Stories & Case Studies/div> h2 classpost-card-title>TWALA TIGHTENS ITS SECURITY POSTURE WITH SECUNA PENTEST/h2> /header> section classpost-card-excerpt> p>Client BackgroundTwala helps businesses to legally and securely sign, and manage tamper-proof documents online with its blockchain digital signature and ID verification services. Furthermore, their platform manages sensitive data and/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2022-03-07>7 Mar 2022/time> span classbull>•/span> 2 min read/span> /div> /footer> /div>/article> article classpost-card post tag-understanding-cybersecurity post-card-large> a classpost-card-image-link href/not-all-hackers-are-bad/> img classpost-card-image srcset/content/images/size/w300/2020/08/381FDFE0-B727-4C67-9E3F-2C040412DC64.jpeg 300w, /content/images/size/w600/2020/08/381FDFE0-B727-4C67-9E3F-2C040412DC64.jpeg 600w, /content/images/size/w1000/2020/08/381FDFE0-B727-4C67-9E3F-2C040412DC64.jpeg 1000w, /content/images/size/w2000/2020/08/381FDFE0-B727-4C67-9E3F-2C040412DC64.jpeg 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/08/381FDFE0-B727-4C67-9E3F-2C040412DC64.jpeg altNot All Hackers Are Bad /> /a> div classpost-card-content> a classpost-card-content-link href/not-all-hackers-are-bad/> header classpost-card-header> div classpost-card-primary-tag>Understanding Cybersecurity/div> h2 classpost-card-title>Not All Hackers Are Bad/h2> /header> section classpost-card-excerpt> p>NOT ALL HACKERS ARE BAD. Some type of hackers are actually GOOD GUYS who can greatly help your company deter cybercriminals from compromising your system./p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-08-17>17 Aug 2020/time> span classbull>•/span> 2 min read/span> /div> /footer> /div>/article> article classpost-card post tag-secuna-newsroom > a classpost-card-image-link href/more-than-20-philippine-schools-hacked-just-this-june-are-we-ready-to-do-online-education/> img classpost-card-image srcset/content/images/size/w300/2020/06/51948867-AE9B-4711-A10A-A6EAF47B520D.jpeg 300w, /content/images/size/w600/2020/06/51948867-AE9B-4711-A10A-A6EAF47B520D.jpeg 600w, /content/images/size/w1000/2020/06/51948867-AE9B-4711-A10A-A6EAF47B520D.jpeg 1000w, /content/images/size/w2000/2020/06/51948867-AE9B-4711-A10A-A6EAF47B520D.jpeg 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/06/51948867-AE9B-4711-A10A-A6EAF47B520D.jpeg altAlmost 30 Philippine Schools Hacked Just This June /> /a> div classpost-card-content> a classpost-card-content-link href/more-than-20-philippine-schools-hacked-just-this-june-are-we-ready-to-do-online-education/> header classpost-card-header> div classpost-card-primary-tag>Company Newsroom/div> h2 classpost-card-title>Almost 30 Philippine Schools Hacked Just This June/h2> /header> section classpost-card-excerpt> p>Cybercriminals have been hard at work in the past few months. Its not just small business and start-ups that are at risk, schools are in just as much risk./p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-06-26>26 Jun 2020/time> span classbull>•/span> 2 min read/span> /div> /footer> /div>/article> article classpost-card post tag-secuna-newsroom > a classpost-card-image-link href/dict-grants-secuna-renewal-of-certification-as-a-recognized-cybersecurity-company-as-a-vulnerability-assessment-and-penetration-testing-vapt-provider-in-the-philippines/> img classpost-card-image srcset/content/images/size/w300/2020/06/44D01AD5-715C-4156-90BF-A4F6529B99DE.jpeg 300w, /content/images/size/w600/2020/06/44D01AD5-715C-4156-90BF-A4F6529B99DE.jpeg 600w, /content/images/size/w1000/2020/06/44D01AD5-715C-4156-90BF-A4F6529B99DE.jpeg 1000w, /content/images/size/w2000/2020/06/44D01AD5-715C-4156-90BF-A4F6529B99DE.jpeg 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/06/44D01AD5-715C-4156-90BF-A4F6529B99DE.jpeg altDICT Grants Secuna Renewal of Certification as a Recognized Cybersecurity Company in the Philippines /> /a> div classpost-card-content> a classpost-card-content-link href/dict-grants-secuna-renewal-of-certification-as-a-recognized-cybersecurity-company-as-a-vulnerability-assessment-and-penetration-testing-vapt-provider-in-the-philippines/> header classpost-card-header> div classpost-card-primary-tag>Company Newsroom/div> h2 classpost-card-title>DICT Grants Secuna Renewal of Certification as a Recognized Cybersecurity Company in the Philippines/h2> /header> section classpost-card-excerpt> p>Secuna has been striving to be at the forefront of cybersecurity in the Philippines. Since our inception in 2017, we have committed ourselves in helping companies, organizations and even the government secure their digital assets./p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-06-16>16 Jun 2020/time> span classbull>•/span> 1 min read/span> /div> /footer> /div>/article> article classpost-card post tag-vulnerabilities-and-testing featured > a classpost-card-image-link href/coordinated-vulnerability-disclosure-assistance-911-for-security-researchers/> img classpost-card-image srcset/content/images/size/w300/2020/04/-Revised--CVDA.png 300w, /content/images/size/w600/2020/04/-Revised--CVDA.png 600w, /content/images/size/w1000/2020/04/-Revised--CVDA.png 1000w, /content/images/size/w2000/2020/04/-Revised--CVDA.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/-Revised--CVDA.png altCoordinated Vulnerability Disclosure Assistance - 911 for Security Researchers /> /a> div classpost-card-content> a classpost-card-content-link href/coordinated-vulnerability-disclosure-assistance-911-for-security-researchers/> header classpost-card-header> div classpost-card-primary-tag>Vulnerabilities and Testing/div> h2 classpost-card-title>Coordinated Vulnerability Disclosure Assistance - 911 for Security Researchers/h2> /header> section classpost-card-excerpt> p>When there’s an emergency, someone can just call 911 and they get connected to the right personnel to help them resolve the emergency. For the internet, when someone discovers/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-04-28>28 Apr 2020/time> span classbull>•/span> 4 min read/span> /div> /footer> /div>/article> article classpost-card post tag-secuna-newsroom tag-customer-stories-case-studies featured > a classpost-card-image-link href/secuna-helps-secure-these-projects-critical-in-helping-the-philippine-government-and-frontliners-fight-the-covid-19-pandemic/> img classpost-card-image srcset/content/images/size/w300/2020/04/-Revised--Secuna-x-DCTx-Dashboard-12.png 300w, /content/images/size/w600/2020/04/-Revised--Secuna-x-DCTx-Dashboard-12.png 600w, /content/images/size/w1000/2020/04/-Revised--Secuna-x-DCTx-Dashboard-12.png 1000w, /content/images/size/w2000/2020/04/-Revised--Secuna-x-DCTx-Dashboard-12.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/-Revised--Secuna-x-DCTx-Dashboard-12.png altSecuna Helps Secure These Projects Critical in Helping The Philippine Government and Frontliners Fight the COVID-19 Pandemic /> /a> div classpost-card-content> a classpost-card-content-link href/secuna-helps-secure-these-projects-critical-in-helping-the-philippine-government-and-frontliners-fight-the-covid-19-pandemic/> header classpost-card-header> div classpost-card-primary-tag>Company Newsroom/div> h2 classpost-card-title>Secuna Helps Secure These Projects Critical in Helping The Philippine Government and Frontliners Fight the COVID-19 Pandemic/h2> /header> section classpost-card-excerpt> p>The Filipino developer community has come together in the spirit of Bayanihan to support frontliners and the government in light of the COVID-19 pandemic, and Secuna is making sure all/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-04-17>17 Apr 2020/time> span classbull>•/span> 2 min read/span> /div> /footer> /div>/article> article classpost-card post tag-vulnerabilities-and-testing > a classpost-card-image-link href/what-is-a-bug-bounty-program/> img classpost-card-image srcset/content/images/size/w300/2020/04/Bug_Bounty_Program-09.png 300w, /content/images/size/w600/2020/04/Bug_Bounty_Program-09.png 600w, /content/images/size/w1000/2020/04/Bug_Bounty_Program-09.png 1000w, /content/images/size/w2000/2020/04/Bug_Bounty_Program-09.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/Bug_Bounty_Program-09.png altWhat is a Bug Bounty Program? /> /a> div classpost-card-content> a classpost-card-content-link href/what-is-a-bug-bounty-program/> header classpost-card-header> div classpost-card-primary-tag>Vulnerabilities and Testing/div> h2 classpost-card-title>What is a Bug Bounty Program?/h2> /header> section classpost-card-excerpt> p>Every website, application or system, no matter how good the software engineers are, will always have errors or vulnerabilities—quite commonly known as “bugs”. This is a basic fact for/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-03-12>12 Mar 2020/time> span classbull>•/span> 4 min read/span> /div> /footer> /div>/article> article classpost-card post tag-vulnerabilities-and-testing tag-tips-and-tricks post-card-large> a classpost-card-image-link href/hacking-applications-with-file-inclusion/> img classpost-card-image srcset/content/images/size/w300/2020/04/stock-photo-114100669.jpg 300w, /content/images/size/w600/2020/04/stock-photo-114100669.jpg 600w, /content/images/size/w1000/2020/04/stock-photo-114100669.jpg 1000w, /content/images/size/w2000/2020/04/stock-photo-114100669.jpg 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/stock-photo-114100669.jpg altHacking Applications with File Inclusion /> /a> div classpost-card-content> a classpost-card-content-link href/hacking-applications-with-file-inclusion/> header classpost-card-header> div classpost-card-primary-tag>Vulnerabilities and Testing/div> h2 classpost-card-title>Hacking Applications with File Inclusion/h2> /header> section classpost-card-excerpt> p>Companies and individual software engineers are constantly developing innovative solutions to solve problems. Almost all of them are building the solution with web or mobile applications using different functionalities to/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-03-12>12 Mar 2020/time> span classbull>•/span> 5 min read/span> /div> /footer> /div>/article> article classpost-card post tag-vulnerabilities-and-testing > a classpost-card-image-link href/what-is-the-vulnerability-disclosure-policy-in-a-vulnerability-disclosure-program/> img classpost-card-image srcset/content/images/size/w300/2020/04/Vulnerability_Disclosure_Program-10.png 300w, /content/images/size/w600/2020/04/Vulnerability_Disclosure_Program-10.png 600w, /content/images/size/w1000/2020/04/Vulnerability_Disclosure_Program-10.png 1000w, /content/images/size/w2000/2020/04/Vulnerability_Disclosure_Program-10.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/Vulnerability_Disclosure_Program-10.png altWhat is the Vulnerability Disclosure Policy in a Vulnerability Disclosure Program? /> /a> div classpost-card-content> a classpost-card-content-link href/what-is-the-vulnerability-disclosure-policy-in-a-vulnerability-disclosure-program/> header classpost-card-header> div classpost-card-primary-tag>Vulnerabilities and Testing/div> h2 classpost-card-title>What is the Vulnerability Disclosure Policy in a Vulnerability Disclosure Program?/h2> /header> section classpost-card-excerpt> p>Vulnerabilities in systems or websites are found every day by security researchers, ethical hackers, tech hobbyists, journalists, academics, and even customers themselves. It would be advantageous for external parties who/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-03-09>9 Mar 2020/time> span classbull>•/span> 4 min read/span> /div> /footer> /div>/article> article classpost-card post tag-understanding-cybersecurity > a classpost-card-image-link href/cybersecurity-is-a-big-problem-for-start-ups-and-small-businesses/> img classpost-card-image srcset/content/images/size/w300/2020/04/Cybersecurity_Is_A_Big_Problem-06.png 300w, /content/images/size/w600/2020/04/Cybersecurity_Is_A_Big_Problem-06.png 600w, /content/images/size/w1000/2020/04/Cybersecurity_Is_A_Big_Problem-06.png 1000w, /content/images/size/w2000/2020/04/Cybersecurity_Is_A_Big_Problem-06.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/Cybersecurity_Is_A_Big_Problem-06.png altCybersecurity Is A Big Problem for Start-ups and Small Businesses /> /a> div classpost-card-content> a classpost-card-content-link href/cybersecurity-is-a-big-problem-for-start-ups-and-small-businesses/> header classpost-card-header> div classpost-card-primary-tag>Understanding Cybersecurity/div> h2 classpost-card-title>Cybersecurity Is A Big Problem for Start-ups and Small Businesses/h2> /header> section classpost-card-excerpt> p>How well-equipped is your business to deal with cybercrimes or data breaches? While cyberattacks are tragedies that you’d think only big companies like Microsoft or Facebook experience — the hard/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Destiny de Guzman /div> a href/author/destiny/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2020/04/D.jpeg altDestiny de Guzman /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/destiny/>Destiny de Guzman/a>/span> span classpost-card-byline-date>time datetime2020-03-06>6 Mar 2020/time> span classbull>•/span> 3 min read/span> /div> /footer> /div>/article> article classpost-card post tag-understanding-cybersecurity > a classpost-card-image-link href/how-cyber-criminals-are-weaponizing-fake-news/> img classpost-card-image srcset/content/images/size/w300/2020/04/Fake_News-05.png 300w, /content/images/size/w600/2020/04/Fake_News-05.png 600w, /content/images/size/w1000/2020/04/Fake_News-05.png 1000w, /content/images/size/w2000/2020/04/Fake_News-05.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/Fake_News-05.png altHow Cyber Criminals Are Weaponizing Fake News /> /a> div classpost-card-content> a classpost-card-content-link href/how-cyber-criminals-are-weaponizing-fake-news/> header classpost-card-header> div classpost-card-primary-tag>Understanding Cybersecurity/div> h2 classpost-card-title>How Cyber Criminals Are Weaponizing Fake News/h2> /header> section classpost-card-excerpt> p>Fake news and disinformation are dangerous things that could cause a lot of harm to individuals, businesses, and even governments — in other words, it’s not something to be taken/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Destiny de Guzman /div> a href/author/destiny/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2020/04/D.jpeg altDestiny de Guzman /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/destiny/>Destiny de Guzman/a>/span> span classpost-card-byline-date>time datetime2020-03-04>4 Mar 2020/time> span classbull>•/span> 3 min read/span> /div> /footer> /div>/article> article classpost-card post tag-updates > a classpost-card-image-link href/whats-new-at-secuna/> img classpost-card-image srcset/content/images/size/w300/2020/04/What_s_New_At_Secuna_.png 300w, /content/images/size/w600/2020/04/What_s_New_At_Secuna_.png 600w, /content/images/size/w1000/2020/04/What_s_New_At_Secuna_.png 1000w, /content/images/size/w2000/2020/04/What_s_New_At_Secuna_.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/What_s_New_At_Secuna_.png altSecuna Platform Update - Q1 2020 /> /a> div classpost-card-content> a classpost-card-content-link href/whats-new-at-secuna/> header classpost-card-header> div classpost-card-primary-tag>Updates/div> h2 classpost-card-title>Secuna Platform Update - Q1 2020/h2> /header> section classpost-card-excerpt> p>We are delighted and excited to share with you today a few updates on our platform. Policy VersioningSecurity Researchers can now see when the policy was last changed and view/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-03-03>3 Mar 2020/time> span classbull>•/span> 2 min read/span> /div> /footer> /div>/article> article classpost-card post tag-vulnerabilities-and-testing > a classpost-card-image-link href/hacking-applications-with-directory-traversal/> img classpost-card-image srcset/content/images/size/w300/2020/04/searching-an-office-filing-cabinet-PVSC4C8.jpg 300w, /content/images/size/w600/2020/04/searching-an-office-filing-cabinet-PVSC4C8.jpg 600w, /content/images/size/w1000/2020/04/searching-an-office-filing-cabinet-PVSC4C8.jpg 1000w, /content/images/size/w2000/2020/04/searching-an-office-filing-cabinet-PVSC4C8.jpg 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/searching-an-office-filing-cabinet-PVSC4C8.jpg altHacking Applications with Directory Traversal /> /a> div classpost-card-content> a classpost-card-content-link href/hacking-applications-with-directory-traversal/> header classpost-card-header> div classpost-card-primary-tag>Vulnerabilities and Testing/div> h2 classpost-card-title>Hacking Applications with Directory Traversal/h2> /header> section classpost-card-excerpt> p>Providing services to customers through applications is now becoming very popular due to its user-friendly interface, global accessibility, and ease of use. However, the careless design and development of applications/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> AJ Dumanhug /div> a href/author/aj/ classstatic-avatar> img classauthor-profile-image src//www.gravatar.com/avatar/d4c4bff9063a7f9971f794abee48fd5e?s=250&d=mm&r=x altAJ Dumanhug /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/aj/>AJ Dumanhug/a>/span> span classpost-card-byline-date>time datetime2020-03-03>3 Mar 2020/time> span classbull>•/span> 3 min read/span> /div> /footer> /div>/article> article classpost-card post tag-understanding-cybersecurity post-card-large> a classpost-card-image-link href/schools-are-note-exempt-from-cyber-crime/> img classpost-card-image srcset/content/images/size/w300/2020/04/Schools_Are_Not_Exempt_From_Cyber_Crime@3x.png 300w, /content/images/size/w600/2020/04/Schools_Are_Not_Exempt_From_Cyber_Crime@3x.png 600w, /content/images/size/w1000/2020/04/Schools_Are_Not_Exempt_From_Cyber_Crime@3x.png 1000w, /content/images/size/w2000/2020/04/Schools_Are_Not_Exempt_From_Cyber_Crime@3x.png 2000w sizes(max-width: 1000px) 400px, 700px src/content/images/size/w600/2020/04/Schools_Are_Not_Exempt_From_Cyber_Crime@3x.png altSchools Are Not Exempt from Cyber Crime: 5 Ways to Stay Secure /> /a> div classpost-card-content> a classpost-card-content-link href/schools-are-note-exempt-from-cyber-crime/> header classpost-card-header> div classpost-card-primary-tag>Understanding Cybersecurity/div> h2 classpost-card-title>Schools Are Not Exempt from Cyber Crime: 5 Ways to Stay Secure/h2> /header> section classpost-card-excerpt> p>While media attention mostly shifts to data breaches in large corporations or even highly-influential individuals, the reality is that no individual or organization is exempt from cyber attacks. After all,/p> /section> /a> footer classpost-card-meta> ul classauthor-list> li classauthor-list-item> div classauthor-name-tooltip> Destiny de Guzman /div> a href/author/destiny/ classstatic-avatar> img classauthor-profile-image src/content/images/size/w100/2020/04/D.jpeg altDestiny de Guzman /> /a> /li> /ul> div classpost-card-byline-content> span>a href/author/destiny/>Destiny de Guzman/a>/span> span classpost-card-byline-date>time datetime2020-03-02>2 Mar 2020/time> span classbull>•/span> 2 min read/span> /div> /footer> /div>/article> /div> /div>/main>div classouter site-nav-main> div classinner> nav classsite-nav> div classsite-nav-left-wrapper> div classsite-nav-left> a classsite-nav-logo hrefhttps://www.secuna.io/>img src/content/images/2022/06/secuna-white.png altSecurity First - News, Research, Events, Updates | Secuna />/a> div classsite-nav-content> ul classnav rolemenu> li classnav-home nav-current rolemenuitem>a hrefhttps://blog.secuna.io/>Home/a>/li> li classnav-news rolemenuitem>a hrefhttps://blog.secuna.io/tag/secuna-newsroom/>News/a>/li> li classnav-research rolemenuitem>a hrefhttps://blog.secuna.io/tag/research/>Research/a>/li> li classnav-events rolemenuitem>a hrefhttps://blog.secuna.io/tag/events/>Events/a>/li> li classnav-updates rolemenuitem>a hrefhttps://blog.secuna.io/tag/updates/>Updates/a>/li> li classnav-tips-tricks rolemenuitem>a hrefhttps://blog.secuna.io/tag/tips-and-tricks/>Tips & Tricks/a>/li> li classnav-vulnerabilities rolemenuitem>a hrefhttps://blog.secuna.io/tag/vulnerabilities-and-testing/>Vulnerabilities/a>/li>/ul> /div> /div> /div> div classsite-nav-right> div classsocial-links> a classsocial-link social-link-fb hrefhttps://www.facebook.com/secuna.io titleFacebook target_blank relnoopener>svg viewBox0 0 32 32 xmlnshttp://www.w3.org/2000/svg>path dM16 0c8.837 0 16 7.163 16 16s-7.163 16-16 16S0 24.837 0 16 7.163 0 16 0zm5.204 4.911h-3.546c-2.103 0-4.443.885-4.443 3.934.01 1.062 0 2.08 0 3.225h-2.433v3.872h2.509v11.147h4.61v-11.22h3.042l.275-3.81h-3.397s.007-1.695 0-2.187c0-1.205 1.253-1.136 1.329-1.136h2.054V4.911z />/svg>/a> a classsocial-link social-link-tw hrefhttps://twitter.com/secunasecurity titleTwitter target_blank relnoopener>svg xmlnshttp://www.w3.org/2000/svg viewBox0 0 32 32>path dM30.063 7.313c-.813 1.125-1.75 2.125-2.875 2.938v.75c0 1.563-.188 3.125-.688 4.625a15.088 15.088 0 0 1-2.063 4.438c-.875 1.438-2 2.688-3.25 3.813a15.015 15.015 0 0 1-4.625 2.563c-1.813.688-3.75 1-5.75 1-3.25 0-6.188-.875-8.875-2.625.438.063.875.125 1.375.125 2.688 0 5.063-.875 7.188-2.5-1.25 0-2.375-.375-3.375-1.125s-1.688-1.688-2.063-2.875c.438.063.813.125 1.125.125.5 0 1-.063 1.5-.25-1.313-.25-2.438-.938-3.313-1.938a5.673 5.673 0 0 1-1.313-3.688v-.063c.813.438 1.688.688 2.625.688a5.228 5.228 0 0 1-1.875-2c-.5-.875-.688-1.813-.688-2.75 0-1.063.25-2.063.75-2.938 1.438 1.75 3.188 3.188 5.25 4.25s4.313 1.688 6.688 1.813a5.579 5.579 0 0 1 1.5-5.438c1.125-1.125 2.5-1.688 4.125-1.688s3.063.625 4.188 1.813a11.48 11.48 0 0 0 3.688-1.375c-.438 1.375-1.313 2.438-2.563 3.188 1.125-.125 2.188-.438 3.313-.875z/>/svg>/a> /div> a classrss-button hrefhttps://feedly.com/i/subscription/feed/https://blog.secuna.io/rss/ titleRSS target_blank relnoopener>svg xmlnshttp://www.w3.org/2000/svg viewBox0 0 24 24>circle cx6.18 cy17.82 r2.18/>path dM4 4.44v2.83c7.03 0 12.73 5.7 12.73 12.73h2.83c0-8.59-6.97-15.56-15.56-15.56zm0 5.66v2.83c3.9 0 7.07 3.17 7.07 7.07h2.83c0-5.47-4.43-9.9-9.9-9.9z/>/svg>/a> /div>/nav> /div>/div> footer classsite-footer outer> div classsite-footer-content inner> section classcopyright>a hrefhttps://blog.secuna.io>Security First - News, Research, Events, Updates | Secuna/a> © 2025/section> nav classsite-footer-nav> a hrefhttps://blog.secuna.io>Latest Posts/a> a hrefhttps://www.facebook.com/secuna.io target_blank relnoopener>Facebook/a> a hrefhttps://twitter.com/secunasecurity target_blank relnoopener>Twitter/a> a hrefhttps://ghost.org target_blank relnoopener>Ghost/a> /nav> /div> /footer> /div> script srchttps://code.jquery.com/jquery-3.4.1.min.js integritysha256-CSXorXvZcTkaix6Yvo6HppcZGetbYMGWSFlBw8HfCJo crossoriginanonymous> /script> script src/assets/built/casper.js?v21dbded237>/script> script> // Parse the URL parameter function getParameterByName(name, url) { if (!url) url window.location.href; name name.replace(/\\/g, \\$&); var regex new RegExp(?& + name + ((^*)|&|#|$)), results regex.exec(url); if (!results) return null; if (!results2) return ; return decodeURIComponent(results2.replace(/\+/g, )); } // Give the parameter a variable name var action getParameterByName(action); $(document).ready(function () { if (action subscribe) { $(body).addClass(subscribe-success); } $(.subscribe-success-message .subscribe-close).click(function () { $(.subscribe-success-message).addClass(close); }); // Reset form on opening subscrion overlay $(.subscribe-button).click(function() { $(.subscribe-overlay form).removeClass(); $(.subscribe-email).val(); }); }); /script> script> // NOTE: Scroll performance is poor in Safari // - this appears to be due to the events firing much more slowly in Safari. // Dropping the scroll event and using only a raf loop results in smoother // scrolling but continuous processing even when not scrolling $(document).ready(function () { var nav document.querySelector(.site-nav-main .site-nav); var feed document.querySelector(.post-feed); var lastScrollY window.scrollY; var lastWindowHeight window.innerHeight; var lastDocumentHeight $(document).height(); var ticking false; function onScroll() { lastScrollY window.scrollY; requestTick(); } function onResize() { lastWindowHeight window.innerHeight; lastDocumentHeight $(document).height(); requestTick(); } function requestTick() { if (!ticking) { requestAnimationFrame(update); } ticking true; } function update() { var trigger feed.getBoundingClientRect().top + window.scrollY; var progressMax lastDocumentHeight - lastWindowHeight; // show/hide nav if (lastScrollY > trigger - 20) { nav.classList.add(fixed-nav-active); } else { nav.classList.remove(fixed-nav-active); } ticking false; } window.addEventListener(scroll, onScroll, { passive: true }); window.addEventListener(resize, onResize, false); update(); });/script> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]