Category: Web Application Security

  • Blog
  • Category: Web Application Security
LOG4J-A BILLION DEVICE VULNERABILITY
LOG4J-A BILLION DEVICE VULNERABILITY
LOG4J-A BILLION DEVICE VULNERABILITY
LOG4J-A BILLION DEVICE VULNERABILITY

LOG4J-A BILLION DEVICE VULNERABILITY

Could you imagine that something very dangerous has been present in billions of devices since 2013 that can potentially take over more than 3.5 billion devices? That seems like chaos! Right? In Christmas time, on Thursday December 9th The Apache Software Foundation released details on a critical vulnerability in Log4j, a logging library used in

Ultimate Guide To SQL Injection – Part I

Cybersecurity expert and hacker Jeff Forristal initially described the SQL injection attack in 1998. It has been more than two decades since its discovery and it is still leading the Owasp Top 10. To define SQL injection vulnerability we can say that when invalid or incompletely verified strings are combined into a dynamic SQL query

Authentication and Authorization

As you recursively visit your local bank, there is a possibility that the bankers will recognize you by looking at you. Yes, we can call this a form of authentication. But as the world moves toward digitization, the methods of authentication are changing as well. Now, we have to log in to our national bank’s

Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR) was listed in the OWASP (Open Web Application Security Project) Top 10 back in 2007 and currently falls under the A5 Broken Access Control category. Idor has been part of the Top 10 vulnerabilities throughout the decade. In Insecure direct object reference an unauthorized request is being made to access

Let’s Talk About How Can We Help You Securely Advance

Get A Free Quote
Insecure Direct Object Reference (IDOR)
Insecure Direct Object Reference (IDOR)