Dhound Cyber Security Blog

Critical Flaws in Cryptocurrency Exchanges

April 12, 2024

Discover the importance of addressing critical vulnerabilities in cryptocurrency exchanges through real-life examples.

Best Mobile App Penetration Testing Companies

March 21, 2024

Discover vital tips for selecting a mobile app security firm. Make informed decisions for robust app protection.

Navigating SOC 2 Compliance and Penetration Testing: Comprehensive Guide

March 7, 2024

Integrating SOC 2 compliance and penetration testing is imperative for organisations seeking to bolster their cybersecurity defences comprehensively.

What Is a Smart Contract Security Audit? - Dhound

April 20, 2023

Learn the importance of smart contract security audit in ensuring trustworthy blockchain transactions. Discover best practices and reputable penetration testing companies in this comprehensive guide.

Clutch Recognized Dhound as Global Leader in Cybersecurity

December 12, 2019

Why trust us? We’re glad you asked. Clutch.co — a B2B ratings and reviews platform — has just named us a global leader in cybersecurity. This is a huge deal, because Clutch.co lends credibility to businesses through real reviews left by verified clients.

A simple <img> tag can cost a fortune for business

October 25, 2019

Today we're going to talk about SSRF attack that allows hackers to send any network requests from the back-end server by using <img> tags.

The four biggest security myths for software development companies

September 26, 2019

In four steps you will learn why you should have started thinking about security even before the project idea was born and why coding standards and hired security geeks can become a turning point for your business stability.

Penetration Testing vs. Vulnerability Scanning - not two peas in a pod

September 26, 2019

The topic of security often provokes hesitation in terms of selecting the right methods to protect your business. Keep steady, in this article, we'll draw a line between vulnerability assessment and penetration testing.

Use RAD frameworks with a sense of security in mind

August 06, 2019

Rapid development frameworks put the development process on a high speed. At the same time, they provoke more vulnerabilities than others. So, RAD frameworks - to be or not to be?

Why your company needs a penetration testing right now?

July 30, 2019

An organization compliant with certain regulations is way more competitive and inspires more clients' confidence among other companies of its domain. More to that, falling short of appropriate security measures involves harsh penalties and considerable fines.

Best penetration testing companies, what are they?

July 16, 2019

Selecting the best penetration testing company can be compared to choosing the right summer camp: those people are going to take care of your "child"! You expect them to be professional, gentle and want your "kid" come back safe and in better health! Here are some recommendations to stick to at picking the best penetration test vendor.

How simple source code share may kick you out of the live system?

July 16, 2019

We are not going to talk about developers' mistakes that could lead to serious holes in the live system. Everything is much simpler - the source code itself may contain direct instructions and access - a cherry pie for someone with bad intentions.

What is penetration testing?

July 05, 2019

Have you heard of a ‘secret customer’ trick? The person pretending to be a customer hired by a third party to test the quality of services provided by the business. Penetration testing works similarly: the so-called noble hackers attempt to track down weak spots in a computer system.

5 Ways to Boost your Web Application Security

April 05, 2019

This article presents several fundamental directions that are simple, will improve web application security and teach you to keep it under control.

Critical Security Logs

February 28, 2019

Log management is an part of any server administrator’s responsibility and is an part of security solutions. There you can find some tips on critical logs that you need for incident investigation and response.

Nmap Cheatsheet

February 11, 2019

Here is the list of most popular and useful nmap commands for port scanning, traffic tracing, getting IP info and many other.

How to check traffic on a server using TcpDump Cheatsheet

February 11, 2019

Here is the list of most popular tcpdump that Dhound team use for production network troubleshooting or capture security events. Tcpdump is a command line network packet sniffer for Linux-based systems.

Security for the Cloud

January 4, 2019

More and more companies are moving to cloud-based data and workloads, as this is a convenient and fast way to scale. All of these companies are faced with the problem of expanding their security to the new environment.

What is a Host-Based IDS and why do you need it?

November 13, 2018

Hackers use increasingly complex and sophisticated techniques to crack the system and stay there undiscovered as long as possible.

All this makes us think that prevention is certainly good, but timely detection and incident response are more relevant in the world where you can not prevent hacker attacks by 100%.

Dhound Celebrates with 2 IT Security Software Certificates!

October 8, 2018

We are very pleased to announce that Dhound has received two prestigious awards from the popular B2B reviews portal FinancesOnline. Additionally, Dhound was recognized in the top list of cyber security software tools.