Top CyberNews September 2021 – Week 2
After the pandemic, there have been new cyber breaches across the globe. Given the sensitivity of data that is being […]
Read MoreTop CyberNews September 2021 – Week 1
After the pandemic, there have been new cyber breaches across the globe. Given the sensitivity of data that is being […]
Read MoreInsufficient Logging And Monitoring
Lack of logging and monitoring the threats to the application from time to time causes massive problems. It may lead […]
Read MoreUsing Components With Known Vulnerabilities
Usage of third-party software components in the development process may lead to this type of attack. Known components like third-party […]
Read MoreInsecure Deserialization
What is Serialization? During the development of web applications, some objects need to be transferred. Objects contain a bunch of […]
Read MoreCross-site Scripting
A cross-site Scripting flaw occurs whenever the attacker makes use of DOM and API to retrieve data or send commands […]
Read MoreSecurity Misconfiguration
Misconfiguration occurs whenever the system fails to meet the security framework standards. It may occur at the application server-side, application […]
Read MoreBroken Access Control
The failure of the system to validate the user even after the user authentication is called Broken Access Control. This […]
Read MoreXML External Entities
XML External Entity injection is the type of threat that allows an attacker to access an application’s XML data processing […]
Read MoreSensitive Data Exposure
Sensitive data is important information or an asset that needs to be protected. It includes personally identifiable information (PII), banking […]
Read More