Skip to content
Logically Secure Ltd
Menu
  • Testing Services
  • Incident Response
  • Consulting
  • Blog
  • About Us
    • Careers
    • Contact Us
    • Data Handling

Author: Website Staff

CVE / Front Page / Information Security / Security / Software Security / Testing

(XSS) Vulnerabilities found – Choose your test scope correctly

This article aims to present how easy is to overlook the security of (some parts of) the application, leaving widely used CMS systems insecure despite its popularity, open source approach …

CVE / Front Page / News / press / Security / Software Security / Testing

LS Team discovers XSS in WordPress Plugin

Often during the penetration testing activities our team comes across potentially unsafe behaviours, coding errors and unspecified misconfiguration errors. This time we had a full access to the WordPress instance, …

504-wiki

Protected: SANS London September 17 TiddlyWiki etc

There is no excerpt because this is a protected post.

CyberCPR / Front Page / News

Listed as a supplier on the UK HMG Digital Marketplace (G-Cloud 9)

We are pleased to announce that Logically Secure has bee selected as a UK HMG Crown Supplier for our CyberCPR product. CyberCPR is available to all UK HMG Customers

504-wiki

Protected: SANS Madrid May 17 TiddlyWiki

There is no excerpt because this is a protected post.

504-wiki

Protected: SANS London May 17 TiddlyWiki

There is no excerpt because this is a protected post.

504-wiki

Protected: SANS KSA (Spring 17) TiddlyWiki

There is no excerpt because this is a protected post.

504-wiki

Protected: SANS London (Mar 17) TiddlyWiki

There is no excerpt because this is a protected post.

504-wiki

Protected: SANS Oslo (Feb 17) TiddlyWiki

There is no excerpt because this is a protected post.

504-wiki

Protected: SANS India (Feb) TiddlyWiki

There is no excerpt because this is a protected post.

Posts navigation

Older posts
Newer posts

Recent Posts

  • 9 Basic Steps to help check an email isn’t Phishing
  • 5 key security factors to working from home more safely
  • 11 Common Cyber-attack Methods
  • 10 fundamental steps of cyber security
  • The Importance of Two-Factor Authentication (2FA)
Copyright © 2023 Logically Secure Ltd