Ritika Singh

How to Prevent XML External Entities?

How to Prevent XML External Entities?

Custom-defined XML entities that are loaded externally and parsed by weak XML parsers, XXE vulnerabilities as they are better known,… Read More

4 years ago

How Does Web Application Security Significantly Improve Overall Security?

Security being an afterthought and not core and integral part of the application development and operations has been a cause… Read More

4 years ago

Best Practices to Protect your Business from Data Breach

Data Breach is the situation were confidential, private and/or sensitive information is exposed to an unsecured environment/ unauthorized individual accidentally… Read More

4 years ago

Danger of Social Engineering Attacks

Social engineering is so dangerous because of the element of human error by legitimate users and not necessarily a flaw… Read More

4 years ago

How Blind SQL Injection Works?

Blind SQL Injections (Blind SQLi) is the more time consuming and difficult to exploit (not impossible) sub-type of SQL Injections… Read More

4 years ago

How to Fix A Hacked Website?

Is your business Web site enabling hackers to distribute malware and orchestrate data breaches/ cyber-attacks? Data suggests that every day… Read More

4 years ago

How do I know if my site is hacked?

Every website, regardless of whether it is a simple blog, a portfolio showcase, a small cupcake business, or a dynamic… Read More

4 years ago

Why Static Code Analysis Is Not Enough?

Developers are often under immense pressure to deliver high quality, compliant web applications within unreasonable timelines and with minimal inaccuracies… Read More

4 years ago