© 2023 Prancer, Inc.

blog

Prancer
January 13, 2023

Developers guide to OWASP top 10 API Security vulnerabilities and MITRE Attack framework relation

Introduction to OWASP top 10 API Security The OWASP API Security Top 10 is a list of the most com...

Read more
Prancer
December 29, 2022

Penetration testing Methods And Tools: A Quick Guide

Penetration Testing is a critical tool for identifying and addressing vulnerabilities in software...

Read more
Prancer
December 29, 2022

The Difference Between Automated Penetration testing And Dynamic Application Security Testing (DAST)

Dynamic Application Security Testing (DAST) and Penetration Testing are both important tools for ...

Read more
Prancer
December 29, 2022

Advantages of Automated Penetration Testing versus Manual Penetration Testing for Cloud Applications

There are several benefits to using Automated Penetration Testing for cloud applications applicat...

Read more
Prancer
December 28, 2022

All You Need To Know About Vulnerability Assessment And Penetration Testing

Vulnerability Assessment and Penetration Testing (VAPT) is a process that helps organizations ide...

Read more
Prancer
December 22, 2022

OWASP top 10 API Security vulnerabilities – Broken Object Level Authorization

Introduction Broken Object Level Authorization refers to the risk of improper authorization contr...

Read more
Prancer
October 30, 2022

How does Prancer modernize openssl 3.X remediations?

What is OpenSSL 3.x vulnerability?    On October 25, the OpenSSL Project announced a critical vul...

Read more