SQL Injection in Panama Paper Leak

How did the biggest document leak happen? Before that, here’s what the whole ruckus is about. Simplified. Little Frank gets 4 coins every week.

Read More

What is Layer 7 DDoS Attack

DDoS attack as an operational problem. They try hard to prove that it’s not their fault and completely overlook the emotional aspects that a company

Read More

31 Google URLs Vulnerable to Open Redirect

Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series and we helped you understand

Read More

Major Cyber Security Numbers – 2016

Sources: Identity Theft Resource Center Data Breach Investigations Report Indusface Research ...

Read More

Remote Code Execution- XML-RPC [Guide]

vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the context of the webserver. This may facilitate various attacks

Read More

We Asked 6 Random Cybersecurity Questions

cybersecurity questions to few of our readers and cybersecurity experts. Here are a few of them. Question 1 to Kevin Du, Senior Member at the Institute

Read More

Ecommerce Website Security Best Practices

ecommerce websites receive anywhere from 200 million to 2 billion visitors in a year. Of course, that is huge when compared to a startup ecommerce website

Read More

CSV Injection with CVS Export Feature

Banking, ecommerce, and a number of other websites increasingly offer spreadsheet export functionality within their applications to help users download .XLS and .CSV but did you know of the CSV Injection risks?

Read More

93 Tips to Secure Website from Hackers

How do you secure website from hackers? Look at some of the expert tips and ensure that hackers stay away from you and your customers.

Read More

My DDoS Story

What is a DDoS? How to stop it? Learn what happened at Fishery of Randomland and how Frank survived a distributed denial of service attack on his website.

Read More