All Stories

CSRF Attacks - How to Find, Exploit and fix them

Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It...

The Future of Tech in Saudi Arabia: Maximizing Opportunities, Minimizing Risks

The rapid growth of technology in Saudi Arabia is a double-edged sword. On one hand, it has the potential to bring new opportunities and improvements to various aspects of life,...

From Detection to Resolution: Streamlining the Vulnerability Management Lifecycle

Vulnerabilities are inevitable in today’s digital landscape, making effective vulnerability management a critical aspect of maintaining a secure environment. From the moment a vulnerability is detected to its successful resolution,...

5 key features of our Vulnerability management system

The Importance of Effective Vulnerability Management

Hacking Zendesk - Cache Deception, Privilege Escalation and more

Another expedition to choose a new target to hack at Snapsec stopped at Zendesk. Zendek aligned with most of our testing principles, which we consider while choosing a new target...

Importance of Regular Security Assessments

Protecting sensitive data and systems has become a top priority for organisations of all sizes in today’s interconnected world. It is crucial to routinely evaluate the security of your systems...