Char49 offers a wide range of information security services with total confidentiality and reliability.

Our experienced professionals have helped organizations to secure their assets, improving trustworthy

We are specialists in Web Applications security testing (e.g. websites, portals, applications, etc.) but with a well-established and solid partners network we can easily cover any scope. We aim to protect our clients assets, mitigating the impact of compromised systems and information leaking. We partner with our clients, sharing the responsibility to protect their assets.


Recent Talks

Research featured on:


Independent security auditing is the best way to identify weaknesses. We offer penetration testing services (one-time-only or persistent) with required support to mitigate any security risks.


Every organisation needs a strong information security posture. We provide the necessary tools and services in establishing a channel to reduce the risk of data losses.


The human factor is still considered to be the primary risk in security. Our trainings empower organizations with the best information to defend itself against ever-evolving threats.


Char49 does real hands-on security

and not simply talk around security.

Learn about us

Recent articles

Are you attending OWASP Global AppSec Lisbon next June?

Either way, you may consider joining Paulo Silva, our Principal Security Researcher and Co-Leader at the OWASP API Security Project, on June 26th, for a whole day of hands-on training on API security.

"The Dark Side of APIs - the Attacker's Approach to Protecting Software" is a 1-day hands-on trai...

Guardians of the Gateway: Unveiling API Security Secrets

In today's digital landscape, Application Programming Interfaces (APIs) serve as the connective tissue that enables seamless data and service exchanges between applications and businesses. However, with this great power comes great responsibility, as API security has become a critical concern. To ad...

API10:2019 Insufficient Logging & Monitoring

One of the challenges for bad actors, apart from finding an exploitable flaw, is to pass unnoticed not only during the research process but also during the exploitation phase. Insufficient logging and monitoring make it hard or even impossible to detect and mitigate suspicious activity or attacks ta...

API9:2019 Improper Assets Management

Introducing breaking changes to a live API with hundreds, thousands, or even millions of active users is (usually) not an option. Releasing a new API version gives a chance to existing users to work on their integrations to migrate to the latest version, without interrupting the service. Nevertheles...