Custom-defined XML entities that are loaded externally and parsed by weak XML parsers, XXE vulnerabilities as they are better known,… Read More
Security being an afterthought and not core and integral part of the application development and operations has been a cause… Read More
Data Breach is the situation were confidential, private and/or sensitive information is exposed to an unsecured environment/ unauthorized individual accidentally… Read More
Social engineering is so dangerous because of the element of human error by legitimate users and not necessarily a flaw… Read More
Blind SQL Injections (Blind SQLi) is the more time consuming and difficult to exploit (not impossible) sub-type of SQL Injections… Read More
Is your business Web site enabling hackers to distribute malware and orchestrate data breaches/ cyber-attacks? Data suggests that every day… Read More
Every website, regardless of whether it is a simple blog, a portfolio showcase, a small cupcake business, or a dynamic… Read More
Developers are often under immense pressure to deliver high quality, compliant web applications within unreasonable timelines and with minimal inaccuracies… Read More