Blog
  • Home
  • Login
  • Try It
Preparing for Your Mobile Application Pentest

Preparing for Your Mobile Application Pentest

Penetration Testing • 3 min read
Customize Severities and Automatically Tag Issues with the New Issue Settings

Customize Severities and Automatically Tag Issues with the New Issue Settings

Announcements • 1 min read
Penetration Testing: The Missing Piece in Your Software Development Lifecycle

Penetration Testing: The Missing Piece in Your Software Development Lifecycle

Penetration Testing • 1 min read
A Practical Guide to Planning Your Next Penetration Test in 2025

A Practical Guide to Planning Your Next Penetration Test in 2025

Penetration Testing • 3 min read
Enhanced Login Security: Introducing Passkeys and IP Allowlisting

Enhanced Login Security: Introducing Passkeys and IP Allowlisting

Announcements • 1 min read
Introducing Halo Security’s New Slack Integration for Real-Time Alerts

Introducing Halo Security’s New Slack Integration for Real-Time Alerts

Announcements • 2 min read
Critical regreSSHion Vulnerability Exposes Millions of OpenSSH Servers

Critical regreSSHion Vulnerability Exposes Millions of OpenSSH Servers

Risks & Vulnerabilities • 1 min read
The Benefits of Ransomware Penetration Testing

The Benefits of Ransomware Penetration Testing

Penetration Testing • 9 min read
Introducing Dark Web Monitoring

Introducing Dark Web Monitoring

Announcements • 2 min read
Easily integrate your Halo Security findings with ArmorCode

Easily integrate your Halo Security findings with ArmorCode

Announcements • 1 min read
More effectively track your dynamic cloud assets with Cloud Connectors

More effectively track your dynamic cloud assets with Cloud Connectors

Announcements • 1 min read
Introducing the new Security Review checklist

Introducing the new Security Review checklist

Announcements • 2 min read
The forgotten first-party risks of third-party platforms

The forgotten first-party risks of third-party platforms

Risks & Vulnerabilities • 2 min read
What are KEVs? Known Exploited Vulnerabilities Explained

What are KEVs? Known Exploited Vulnerabilities Explained

Risks & Vulnerabilities • 2 min read
New Feature: Detect exposed secrets and API keys in JavaScript

New Feature: Detect exposed secrets and API keys in JavaScript

Announcements • 1 min read
Exploring third-party risk: 5 common issues on the modern attack surface

Exploring third-party risk: 5 common issues on the modern attack surface

Attack Surface Management • 3 min read
Older Posts →
Platform
  • Home
  • Overview
  • Customers
  • Resources
  • Plans & Pricing
Services
  • Discovery
  • Firewall Monitoring
  • Website Monitoring
  • Server Scanning
  • Application Scanning
  • Compliance Reporting
  • Human Assessment
  • Penetration Testing
  • Security Review
Use Cases
  • Attack Surface Inventory
  • External Vulnerability Management
  • Monitor Subsidiary Risk
  • Evaluate Mergers & Acquisitions
  • Assess Security Program Effectiveness
  • Prevent Subdomain Takeovers
Solutions
  • Monitor Certificates
  • Monitor Cookies
  • Monitor Headers
  • Monitor Forms
  • Monitor JavaScript
  • Monitor Downloads
Community
  • Support
  • Blog
Company
  • About Us
  • Partner List
  • Become a Partner
  • Terms
  • Privacy
  • Contact
  • Consent Preferences
© 2025 TrustedSite