Secureaks Logo Secureaks

Our latest articles

Why should you have your source code audited?

By Romain Garcia on 04/02/2025 in the Ethical Hacking category

Article illustration

Source code auditing is an essential tool for identifying vulnerabilities that are often invisible during conventional penetration testing. By combining manual analysis and automated tools, it enables you to assess the intrinsic security of an application, while revealing errors in logic, rights management or implementation.

Install Kali Linux on VirtualBox in 5 minutes

By Romain Garcia on 04/01/2025 in the Tools category

Article illustration

If you're just starting out, or simply want to test Kali Linux in an isolated environment, installing it on a virtual machine is an excellent option. This allows you to manipulate the distribution without touching your main system, in complete safety.

In this article, I'll show you how to install Kali Linux on VirtualBox in just a few minutes, without going through the classic installation process. We'll be using an official preconfigured image provided by the Kali team.

How to secure a WordPress site in 2025 : Complete guide

By Romain Garcia on 03/24/2025 in the Cybersecurity category

Article illustration

WordPress powers more than 43% of the world's websites today, making it the most widely used content management platform (CMS). But this popularity also makes WordPress a prime target for cyber attacks.

Vulnerabilities in extensions, outdated themes, weak configurations... A poorly protected WordPress can easily become an attacker's entry point. Fortunately, there are some simple and effective best practices to reduce the risks.

In this article, we'll take a look at how to secure a WordPress site, with practical advice you can apply today.

FFuF: The essential tool for web pentests

By Romain Garcia on 03/05/2025 in the Tools category

Article illustration

When performing a security audit on a web application, it is essential to identify publicly exposed resources, such as files, folders or API endpoints. Enumerating these elements can uncover potential security flaws and expand the attack surface.

There are several tools available for this task, including FFuF (Fast Fuzzing), which we'll discuss here.

The different approaches to Web pentesting

By Romain Garcia on 03/04/2025 in the Ethical Hacking category

Article illustration

Penetration testing, or pentesting, is an essential step in assessing the security of web applications. It involves simulating attacks in order to identify and correct potential vulnerabilities. Different approaches to pentesting exist, each offering a unique perspective on system security. The main methods are blackbox, greybox and whitebox testing.

Matomo