Logo Logo
  • Home
  • Modshield SB
  • services
    • Application Security Testing
    • IoT Security Testing
    • Infrastructure Security Testing
    • Testing for Compliance
    • Red Team Exercise
    • Performance Testing
  • Training
    • Cybersecurity Awareness Program
    • Cybersecurity For Developers(Web Application)
    • Cybersecurity For Developers(Mobile Application)
  • Resources
    • Blog
    • CyberNews
  • About
    • Partners
    • Contact

Category Archives: Blog

  • Home
  • Category
September 8 2021
  • Blog

Insecure Deserialization

What is Serialization? During the development of web applications, some objects need to be transferred. Objects contain a bunch of […]

Read More
September 7 2021
  • Blog

Cross-site Scripting

A cross-site Scripting flaw occurs whenever the attacker makes use of DOM and API to retrieve data or send commands […]

Read More
September 6 2021
  • Blog

Security Misconfiguration

Misconfiguration occurs whenever the system fails to meet the security framework standards. It may occur at the application server-side, application […]

Read More
September 5 2021
  • Blog

Broken Access Control

The failure of the system to validate the user even after the user authentication is called Broken Access Control. This […]

Read More
September 4 2021
  • Blog

XML External Entities

XML External Entity injection is the type of threat that allows an attacker to access an application’s XML data processing […]

Read More
September 3 2021
  • Blog

Sensitive Data Exposure

Sensitive data is important information or an asset that needs to be protected. It includes personally identifiable information (PII), banking […]

Read More
September 2 2021
  • Blog

Broken Authentication

What Is Broken Authentication? Broken authentication is theft of user credentials, session tokens, keys, etc.. to gain unauthorized privilege. It […]

Read More
September 1 2021
  • Blog

SQL Injection Attack In Cybersecurity

An injection is a broad class of attack vectors where the attacker provides an altered input to a program. When […]

Read More
August 31 2021
  • Blog

What are the OWASP top 10 vulnerabilities?

OWASP The Open Web Application Security Project (OWASP) is an online nonprofit initiative that derives a set of rules or […]

Read More
August 30 2021
  • Blog

Cybersecurity Trends in 2021

With the unending pandemic, all businesses, small or large corporates, organizations, and even governments rely on computerized systems to manage […]

Read More
  • 1
  • …
  • 3
  • 4
  • 5
  • 6

Recent Posts

  • SOC 2 Compliance – Complete Guide
  • What is compliance and why do you need it?
  • OWASP WAF – Web Application Firewall
  • Top Cyber News April Week 3
  • Top Cyber News April Week 2

Recent Comments

  1. Vishnu on IEC 62443 – Cybersecurity for Industrial Automation and Control Systems

Archives

  • July 2022
  • June 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • June 2020

Categories

  • Blog
  • CyberNews
© Copyright 2020. Anada WordPres Theme By WordPressRiver