Vulnerabilities & OWASP Top 10

WannaCry Ransomware Attack

A Brief on Meltdown & Spectre

A published research revealed that almost every computer chip manufactured in the last 20 yrs contains Spectre & Meltdown.

Read More

Zero Day Prevention

3 Ways to Prevent Zero-Day Attacks

Zero-Day attackers exploit undisclosed vulnerabilities that are unknown to application vendor or developer. Detection and patching can take weeks.

Read More

How to Prevent SQL Injection Attack

How to Prevent SQL Injection Attacks?

SQL injection has been troubling websites from over 17 years. It’s about time that you find out what it’s all about and how can you prevent SQL injection.

Read More

Automated Attacks

What Are Automated Attacks?

Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding

Read More

What is XML-RPC

What is XML-RPC? How to Detect it?

vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the context of the webserver. This may facilitate various attacks

Read More

CSV Injection

CSV Injection with CVS Export Feature

Banking, ecommerce, and a number of other websites increasingly offer spreadsheet export functionality within their applications to help users download .XLS and .CSV but did you know of the CSV Injection risks?

Read More

Cross Site Scripting Prevention

The End of Application Security As You Know It

The current ‘automating everything’ approach for application security shouldn’t be just replaced. It should be buried down under for greater good.

Read More

‘Badlock’ Bug: Everything You Need to Know

Badlock is referenced for Microsoft Windows by CVE-2016-0128 / MS16-047 (Windows SAM and LSAD Downgrade Vulnerability) and for Samba by CVE-2016-2118 (SAMR and LSA man in the middle attacks possible).

Read More

All You Need To Know About DROWN Attack

DROWN allows hackers to decrypt browser-server communication in hours to attack servers or/and users. Shockingly, this newly found vulnerability

Read More

OWASP Top 10 Vulnerabilities

OWASP Top 10 Vulnerabilities

The first part of OWASP Top 10 series on web and mobile applications. It explains how OWASP 10 vulnerabilities help hackers with disruption.

Read More