
Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.
Read MoreStarbucks does have the best coffee in the world. But, do they have the best cybersecurity defense? ? Johnstone discovered It was possible to execute arbitrary code by uploading a webshell
Read MoreTo evolve in modern-day VAPT (Vulnerability Assessment and Penetration Testing), it is essential to stay ahead of the ever-changing cybersecurity landscape
Read MoreOrganizations face multiple cybersecurity dangers in the digital age, which could compromise confidential information.
Read MoreYour product is designed to handle sensitive customer data, ranging from personal information to financial records.
Read MoreIn today's interconnected world, where businesses rely heavily on web applications to interact with customers.
Read MoreAre you aware that more than 810 million web applications, which account for over 30% of all web applications.
Read MoreRansomware has emerged as one of the most dangerous and persistent threats in the cybersecurity landscape.
Read MoreDiscover how combining in-house security expertise with external VAPT teams can maximize your organization's security.
Read MoreIn today's interconnected digital landscape, web applications serve as the backbone of numerous online services, facilitating everything from e-commerce transactions to social media interactions.
Read MoreImagine a bank with an API that allows you to check your account balance and make transactions from your favorite budgeting app
Read MoreProtecting your domain against DNS hijacking attempts is essential in the modern digital world.When hostile actors take over a domain's DNS settings.
Read MoreData breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.
Read MoreGitHub is a hosting platform which helps developers to collaborate in building software’s. It helps the developers to manage source code management.
Read MoreCross-site scripting (XSS) is one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications.
Read MoreXML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser
Read MoreServer Side Includes (SSIs) are directives present on web applications, used to feed an HTML page of the application with dynamic contents based on user’s input.
Read MoreDependency Track is a free, open-source continuous component analysis platform that helps businesses discover and mitigate supply chain risk
Read MoreSAML the Security Assertion Markup Language was created by an organization known as OASIS.Nowadays applications make use of the latest version of SAML 2.0.
Read MoreA web application is helpless against Cross Site Port Attack if it forms client provided URL’s and does not disinfect the backend reaction obtained from remote servers previously while sending it back to the client.
Read MoreServer-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application
Read MoreSQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications.
Read MoreNull Byte Injection is an exploitation technique which uses URL-encoded null byte characters to the user-supplied data. This injection process can alter the intended logic .
Read MoreThe term CRLF refers to Carriage Return (ASCII 13, , \r) Line Feed (ASCII 10, , \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.
Read MoreSQL injection is an attack when an attacker persuades to “inject” his harmful/malicious SQL code into someone else’s database, and force that database to run his SQL
Read MoreMost commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.
Read MoreThief plots heist at home. It takes him some time to figure out how to get into the house without being noticed. What we're doing here is called Vulnerability assessment.The thief could have used a glass door .
Read MoreIn the fast-paced world of Banking, Financial Services, and Insurance (BSFI), organizations rely heavily on Software as a Service (SaaS).
Read MoreIf you're a business owner, you know that cybersecurity is an essential concern.
Read MoreWhat would you say if we told you that certain service was at USD 1.53 Billion in 2016 and is expected to reach USD 7.63 Billion by 2022.Is not this an exponential increase? Yes, that service is CDN WAF.
Read MoreWeb applications are updated on a frequent basis in today's fast-paced development settings, and agile, integrated methodologies like DevOps are swiftly becoming the norm.To design, test, and update diverse apps
Read MoreAs with web applications, APIs operate on the web, but many require some sort of authentication or authorization before you can access the valuable.
Read MoreWeb Service is a software service used to create a communication between 2 devices connected over a network through internet.
Read MoreBEAST (Browser Exploit Against SSL/TLS) is a network vulnerability attack against TLS 1.0 and older SSL protocols. Security researchers carried out the attack for the first time in 2011, but the theoretical vulnerability was discovered in 2002.
Read MoreFile transfer protocol, a standardized protocol used to allow transmission of files between computers. It consists of a set of coded signals which are transmitted between computers, and which inform
Read MoreAs an open standard, the JSON Web Token (JWT) defines a compact and self-contained method for securely transmitting information between parties as a JSON object (RFC 7519).
Read MoreThe new normal has made the market bigger for digital transformation projects and strategies for moving to the cloud.
Read MoreApache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.
Read MoreBanner grabbing or active reconnaissance is a type of attack during which the attackers send requests to the system they are attempting to attack in order.
Read MoreYes, I am talking about U.S department of defense get hacked. Bibek Dhakal found that the xmlrpc.php file on the U.S. Department of Defense website had been turned on leaving it open to an attack on other sites. The XML Rpc.php in WordPress is turned on by default
Read MorePeople don't often stop to think about the most basic parts of how the internet works. But what happens when you browse the Internet? You could be using a proxy server at work, on a Virtual Private Network (VPN).
Read MoreWho will offer $36,000 for finding a bug? Yes, it has happened. And, by the the greatest company of the planet: Apple. From the prize, you can well understand the magnanimity .
Read MoreYes! Hacking people's accounts is illegal. Hacker’s are enjoyed playing with weak credentials. A weak password is one that is easy to guess using a subset of all possible passwords in a brute force attack.
Read MoreIn this kind of testing, the penetration tester acts like a normal hacker who doesn't know anything about the target system.Testers don't get any diagrams of the architecture or source code that isn't available to the public.
Read MoreWhen a browser asks a web server for a page, the server sends back the page's content along with headers. Some headers have meta-data about the content,
Read MoreMost people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.
Read MoreOut of the entire population on the planet earth, at least most of them have a Facebook account. What if I tell you that these data's can be hacked not from your computer but from the cloud.
Read MoreImagine John surfing on the internet. He likes a product from a website. He orders it & now it is time to pay for it. He puts in the banking credentials. Everything went well.
Read MorePhishing is a type of social engineering attack used to obtain sensitive information from users, such as login credentials and credit card information.It
Read MoreTwitter is one of the most popular social media platforms available today, with 100 million daily active users and 500 million tweets sent daily. But, do they have the best cybersecurity defense? Youssef discovered It was possible to inject the CRLF injection
Read MoreHTTP Request Smuggling is one of the critical web application vulnerabilities that is often goes unnoticed by many security reasearchers and penetration testers due to its complexity.
Read MoreDrupal is one of the most popular open source Content Management System (CMS) meant for developing, designing etc.
Read MoreIn this modern digital era, online transactions play a pivotal role.
Read MoreFor a long time in the cyber security world, Web applications are subjected to various kinds of security vulnerabilities because of the increase in its usage and the use of dynamic web application technologies
Read MoreWordPress plugin LiteSpeed Cache has a cross-site scripting vulnerability because it does not properly sanitize user input. An attacker can take advantage.
Read MoreThere’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .
Read MoreThe Cyber Kill Chain framework is a part of the Intelligence driven defense model for identification and prevention of cyber intrusion activities (i.e. Hack or Breach).
Read MoreOWASP is the blueprint for testing the web application security controls. It is safe to say that it helps the developers to develop application.
Read MoreAn API is called as Application Programming Interface which is used for communication. An API acts as a middle man who delivers your request to the provider and then delivers response to
Read MoreData as general is a set of information, knowledge or fact that is measured and stored in storage devices.
Read MoreSpring is a popular lightweight Java platform application framework that enables developers to easily create Java applications with enterprise-level features
Read MoreThe primary goal was to create an ontology that would serve as a common language for developers,
Read MoreHTTP and that all redirection to the site using HTTP should be changed to HTTPS requests by default.
Read MoreDMARC also known as Domain Message Authentication, Reporting & Conformance is a technical standard that helps protect email senders and recipients from email related spoofing and phishing attacks
Read MoreOS command injection is a technique used via a web interface in order to execute OS commands on a web server. The user supplies operating system commands through a web interface in order to execute OS commands.
Read MoreOne thing that you have to remember is that outside parties such as auditors, customers don’t care how vulnerabilities got into your environment. Even if your hands are tied, application security flaws can and likely will .
Read MoreThese services are designed to provide easy, affordable access to applications and resources, without the need for internal infrastructure or hardware
Read MoreCyberattacks are a major nuisance that aren't going anywhere anytime soon. Growing at an estimated 15% year over year, cybercrime costs to organizations worldwide are forecast to reach $10.5 trillion annually by 2025.
Read MoreCVE-2021-44228 is the name of the zero-day vulnerability, which can affect any programme that logs user input. The effect may be seen in a variety of places, including Minecraft, which registers the names of users.
Read More