Vulnerabilities & OWASP Top 10

Zero Day Security

3 Ways to Prevent Application Zero-Day Attacks

Zero-Day attackers exploit undisclosed vulnerabilities that are unknown to application vendor or developer. Detection and patching can take weeks.

Read More

How to Stop SQL Injection

SQL injection has been troubling websites from over 17 years. It’s about time that you find out what it’s all about and how can you prevent SQL injection.

Read More

What Are Automated Attacks

Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding

Read More

Remote Code Execution- XML-RPC [Guide]

vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the context of the webserver. This may facilitate various attacks

Read More

CSV Injection with CVS Export Feature

Banking, ecommerce, and a number of other websites increasingly offer spreadsheet export functionality within their applications to help users download .XLS and .CSV but did you know of the CSV Injection risks?

Read More

The End of Application Security As You Know It

The current ‘automating everything’ approach for application security shouldn’t be just replaced. It should be buried down under for greater good.

Read More

‘Badlock’ Bug: Everything You Need to Know

Badlock is referenced for Microsoft Windows by CVE-2016-0128 / MS16-047 (Windows SAM and LSAD Downgrade Vulnerability) and for Samba by CVE-2016-2118 (SAMR and LSA man in the middle attacks possible).

Read More

All You Need To Know About DROWN Attack

DROWN allows hackers to decrypt browser-server communication in hours to attack servers or/and users. Shockingly, this newly found vulnerability

Read More

3 Web Application Testing Best Practices

Is your web application scanning offering absolute testing? Are you truly considering businesses logic flaws and zero-day threats. Read about it here.

Read More

Are You Secure Against These Recently-Found Threats?

Zero-day and OWASP vulnerabilities are not the only threat that website owners face. It is important to stay updated on recently-found vulnerability too.

Read More