top of page
AppSec
Application Security (AppSec) Service
Application Security Services by Cybenari In a world where applications power nearly every aspect of business, securing them is no longer...
idan ba
Jul 293 min read


What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places
<p>TL;DR I deployed canary tokens in various public places on the Internet, logged all access attempts, and discovered intriguing patterns on credential discovery and attack methodologies of threat actors. Canary Tokens Primer Canary tokens are a type of digital tripwire designed to detect unauthorized access or activity within a system. They work by embedding seemingly […]</p>
idan ba
Aug 8, 202412 min read


Shifting Left in AppSec - A Lesson from Benjamin Franklin
In the bustling city of Philadelphia during the 18th century, fire was a constant and terrifying threat. Wooden structures, open flames, and a lack of organized firefighting resources made the city vulnerable to devastating blazes. It was in this environment that Benjamin Franklin, a man of foresight and innovation, took action. In 1736, Franklin observed
idan ba
May 28, 20243 min read


The Four Pillars of Cyber Risk Management
<p>Your organization is a castle, and in this modern age, cyber threats are the besieging army at your gates. The ladders are up, the catapults are drawn back, and a breach is only a matter of time. Sounds dramatic? Maybe, but the world of cybersecurity is a high-stakes game that commands the same level of […]</p>
idan ba
Sep 7, 20235 min read


Best Secure Development Practices for Developers
<p>Introduction In the digital age, where software applications are at the heart of daily activities, ensuring their security is of paramount importance. Secure coding practices are the foundation of building software that can withstand evolving cyber threats. In this blog post, we will delve into the fundamentals of secure coding and highlight essential best practices […]</p>
idan ba
Aug 15, 20233 min read


10 Methods to Mitigate Your SaaS Supply Chain Risk
<p>The Problem Over the last few years more and more R&D teams have started to abandon the traditional method of using 3rd party vendors, which required them to install and maintain their own instances of 3rd party’s solutions. Instead, teams started to adopt the new approach in which “Everything is a SaaS”. For example, nowdays […]</p>
idan ba
Aug 1, 20237 min read


Unique Challenges and Best Practices in Securing SCADA and ICS
<p>Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) play a critical role in managing and controlling industrial processes and critical infrastructure. However, their increasing connectivity to the internet and other networks has made them vulnerable to cyber threats. Securing SCADA and ICS environments presents unique challenges that demand a tailored approach to […]</p>
idan ba
Aug 1, 20233 min read
bottom of page

