Guardians of the Enterprise — Insights from leading cyber experts.

Listen Now →

Web Application Security

161 articles

← All Articles
31 Google URLs Vulnerable to Open Redirect

31 Google URLs Vulnerable to Open Redirect

Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP…

We Asked 6 Random Cybersecurity Questions

We Asked 6 Random Cybersecurity Questions

cybersecurity questions to few of our readers and cybersecurity experts. Here are a few of them. Question 1…

CSV Injection with CVS Export Feature

CSV Injection with CVS Export Feature

Banking, ecommerce, and a number of other websites increasingly offer spreadsheet export functionality within their applications to help…

93 Small Business CyberSecurity Guide

93 Small Business CyberSecurity Guide

How do you secure website from hackers? Look at some of the expert tips and ensure that hackers…

The End of Application Security As You Know It

The End of Application Security As You Know It

The current ‘automating everything’ approach for application security shouldn’t be just replaced. It should be buried down under…

What Your Web App Security Had Been Missing?

What Your Web App Security Had Been Missing?

With rising number of security lapses, the question is inevitable. While many companies understand the importance and need…

‘Badlock’ Bug: Everything You Need to Know

‘Badlock’ Bug: Everything You Need to Know

Badlock is referenced for Microsoft Windows by CVE-2016-0128 / MS16-047 (Windows SAM and LSAD Downgrade Vulnerability) and for…

Why Should Startups Endure Continuous Data Breaches?

Why Should Startups Endure Continuous Data Breaches?

In 1996, nine years after the launch of the World Wide Web Project, number of websites had grown…

Take the Application Security Quiz

Take the Application Security Quiz

Do you know about the recent bank cyber heist attempt in Bangladesh? Apparently, hackers tried to steal $951…

All You Need To Know About DROWN Attack

All You Need To Know About DROWN Attack

DROWN allows hackers to decrypt browser-server communication in hours to attack servers or/and users. Shockingly, this newly found…

35 Security Stats Businesses Should Not Miss

35 Security Stats Businesses Should Not Miss

Did you know that 155 .GOV and .NIC domains were hacked last year? Learn about more of such…

Cybersecurity Startup Award Best Product Company

Cybersecurity Startup Award Best Product Company

Somewhere in October, NASSCOM-DSCI closed nominations for the Excellence Award. From there, read Indusface’s journey to Emerging IS…