25
Mar
Signs of Cyber Attack and How to Respond to them?
0
Online business is the new trend in this era’s market. Having a website is just like owning a shop and getting a platform to showcase... Read More
06
Feb
WHAT DO YOU KNOW ABOUT BROKEN AUTHENTICATION AND SESSION BREACH?
As we are covering OWASP top 10 vulnerabilities,broken authentication is one of it. Broken Authentication itself suggests the breach in the authentication procedure of a... Read More
08
Jan
Know How to Prevent Your Application from an XXE (XML External Entity) Attack
What is an XXE (XML External Entity) attack? Any application that parses XML input can become prey for an XXE (XML External Entity) attack. An... Read More
31
May
Open Web Application Security Project Audit
Introduction Open Web Application Security Project (OWASP) produces methodologies, documentation, tools, and technologies in the area of web application security. It produces Top 10 vulnerabilities after every... Read More