OWASP top 10 vulnerabilities 2021
OWASP? The Open Web Application Security Project (OWASP) is an open-source initiative that derives a set of rules or protocols, […]
Read MoreWAF vs Firewall: Know the differences
Both WAF and a firewall play a critical role in network security. Despite the size of the network, these two […]
Read MoreVirtual Patching – How can it help, when it comes to cybersecurity?
What is virtual patching? Virtual patching or vulnerability shielding is a security policy of the enforcement layer. It analyses transactions, […]
Read MoreInsufficient Logging And Monitoring
Lack of logging and monitoring the threats to the application from time to time causes massive problems. It may lead […]
Read MoreUsing Components With Known Vulnerabilities
Usage of third-party software components in the development process may lead to this type of attack. Known components like third-party […]
Read MoreInsecure Deserialization
What is Serialization? During the development of web applications, some objects need to be transferred. Objects contain a bunch of […]
Read MoreCross-site Scripting
A cross-site Scripting flaw occurs whenever the attacker makes use of DOM and API to retrieve data or send commands […]
Read MoreSecurity Misconfiguration
Misconfiguration occurs whenever the system fails to meet the security framework standards. It may occur at the application server-side, application […]
Read MoreBroken Access Control
The failure of the system to validate the user even after the user authentication is called Broken Access Control. This […]
Read More