Pākiki Blog

The latest insights, vulnerabilities, research, and release information from the Pākiki team.

Follow us on social media:
Categories: Security  Proxy  Walkthroughs 
featured image What you should know about WAFs

What you should know about WAFs


Categories: Security Tags: Advice
Background Web application firewalls are commonly used to defend web applications (or mobile applications, APIs, etc) against known attacks. At a basic level, they work by having a large set of rules which defines what bad or malicious requests to the site look like. You would set it up against a … ...Read Article

featured image PCI DSS 4.0 Compliance

PCI DSS 4.0 Compliance


Categories: Security Tags: Explanation
Over the last few weeks we have been having a number of conversations with clients about PCI DSS 4.0.1; specifically, where and how we could help them with being more compliant. Firstly, let’s take a look at what PCI DSS 4.0 is. The PCI Security Standards Council’s guideline document (Link in the … ...Read Article

featured image Getting into Cybersecurity

Getting into Cybersecurity


Categories: Security Tags: Careers Advice
We’re regularly getting people reaching out and asking for either jobs or career advice. So what does it take to get into cybersecurity, and penetration testing in particular? Caveats: These are the views of Pākiki, other pentesting companies may have different policies or things they value. If you … ...Read Article

featured image 3 Tips to Improve your Security Posture

3 Tips to Improve your Security Posture


Categories: Security Tags: Explanation
It was our honour to present at TechFest, run by Canterbury Tech, on the 24th of May 2024. This talk was designed as an introduction to improving your business’s cybersecurity posture. It’s aimed at small to medium businesses who are either unsure of where to start, or are rolling out new systems. … ...Read Article

featured image What Is an Intercepting Proxy?

What Is an Intercepting Proxy?


Categories: Proxy Security Tags: Explanation
That’s a great question. An intercepting proxy is commonly used by security professionals in order to understand how an application communicates with a server, and to attempt to find security vulnerabilities by manipulating that traffic. An intercepting proxy is a tool we frequently use in … ...Read Article