Secureaks Blog - Cybersecurity


Why whitelist a pentester on a WAF?

Article illustration

When a company carries out an application penetration test, the main objective is to assess the actual security level of the web application, its functionalities, its code and its exposure to attacks. However, one element can quickly distort the results: the presence of a WAF (Web Application Firewall). In this context, whitelisting a pentester on a WAF is common practice and often necessary to guarantee the relevance of tests. This approach is not intended to reduce security, but to enable reliable assessment of application vulnerabilities.

React2Shell: full analysis (CVE-2025-55182)

Article illustration

The React2Shell flaw affects React Server Components (RSC) and allows, under certain conditions, remote code execution (RCE) on the server hosting the application. It requires no authentication, is very easy to exploit, and logically achieves the maximum score of 10/10 on the CVSS scale.

In this article, we'll look at what exactly React2Shell is, which versions are affected, how the vulnerability works, how to detect and exploit it, and above all, how to protect against it effectively.

How often should I run a penetration test on my website?

Article illustration

Web application security is a major challenge for all companies with an online presence. Cyber-attacks are constantly evolving, exploiting the slightest vulnerability to gain access to sensitive data or compromise service availability. In this context, penetration testing (pentesting) is essential to identify and correct security vulnerabilities before they are exploited. But how often should such tests be carried out?

5 cybersecurity mistakes that small businesses still make too often

Article illustration

Cybersecurity has become a crucial issue for companies of all sizes. Yet many small and medium-sized businesses continue to make fundamental mistakes that expose them to significant risks. These mistakes are all the more problematic in that they are often avoidable with a minimum of good practice and awareness. This article looks at five of them and explains why they need to be corrected quickly.

Pentest in production or in a test environment: which is better?

Article illustration

Penetration testing, or "pentesting", is a crucial step in the process of securing an information system. It identifies vulnerabilities that could be exploited by an attacker, so that they can be corrected before an incident occurs. But one question often comes up: should this test be carried out in a production environment, or on a testing platform? Each of these approaches has its advantages and disadvantages, which need to be clearly understood.

Matomo