Monday, February 24, 2025

Web Applications

Hackers Use Fake Google Analytics Scripts To Steal Credit Card Details from Magneto-based Websites

Hackers inject malicious skimmer scripts that steal the credit card information from the checkout pages of Magento based online shopping sites.Security researchers from Sucuri...

Researcher Awarded $10,000 for Disclosing Critical XSS Vulnerability in Yahoo Mail

A Finland based security researcher named Jouko Pynnönen awarded $10,000 for disclosing critical cross-site scripting (XSS) vulnerability in the webmail version of Yahoo Email...

Pwn2Own – Ethical Hackers Hacked Samsung Galaxy S9, iPhone X, Xiaomi Mi6 & Got Reward $325,000

Group of White hat hackers compromised Samsung Galaxy S9, iPhone X,  Xiaomi Mi6 and earned $325,000 in Pwn2Own, two days Hacking completion in Tokyo...

Gartner Released Magic Quadrant for Web Application Firewalls – Imperva WAF Selected as a #1 Best WAF

Currently Web Application Firewall performing a major role in  Web application protection since the web applications are primary targets for cybercriminals and the impact...

OWASP TOP 10 – 2017 Released After Four years – Critical Web Application Security Risks

After four years Open Web Application Security Project(OWASP) released Top 10 Most Critical Web Application Security Risks and the last update was in 2013.Last...

WordPress plugin Gaint BestWebSoft’s 53+ Plugin’s Vulnerable to Multiple Cross Site Scripting (XSS)

Recent Security Audits Reveal that , WordPress plugin's software Provider BestWebSoft's Many Plug's are vulnerable to Multiple Cross - Site Scripting (XSS) . This...

XSSight – Automated XSS Scanner And Payload Injector

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable.What is XSS(Cross Site Scripting)?An attacker can inject untrusted snippets...

Most Important Vulnerability test methods for application security assessments

Many security Experts are thrust into the uncomfortable position of dealing with a huge portfolio of potentially insecure applications, limited resources and an overwhelming...