Tag: Webapplication
Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...
Secure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated...
Perimeter 81 is excited to announce the early availability of our Secure Web Gateway (SWG) Solution. Organizations can now benefit from setting custom web...
Kickstart Robust Cloud Security with the Industry’s Best Website Security Checklist
Website security checklist and cloud security best practices have made it to the top of the must-have lists of organizations of all kinds. Why?...
Web Application Attacks – Types, Impact & Mitigation – Part-4
With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -4 we are covering the following...
Web Application Attacks – Types, Impact & Mitigation – Part-3
With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -3 we are covering the following...
Web Application Attacks – Types, Impact & Mitigation – Part-2
With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -2 we are covering the following...
Web Application Attacks – Types, Impact & Mitigation – Part-1
With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -1 we are covering the following...
How Web Application Security Solution Helps Businesses of any size, from all Different Industry...
A web application security solution can help businesses protect their apps and website from potential cyberthreats. Businesses of all sizes, across industries and verticals, depend on...
Businesses Need Automated Web Application Security Scanners to Detect Web Vulnerabilities
It is a popular belief that automated web application security scanners are not good enough. We even find some IT security professionals saying that...
Hackers Attacking WebLogic Servers via CVE-2020–14882 Flaw to install Cobalt Strike Malware
Attackers are found to be exploiting Oracle WebLogic Servers via CVE-2020–14882 to install Cobalt Strike which will allow persistent remote access to the compromised...