Webapplication

Businesses Need Automated Web Application Security Scanners to Detect Web Vulnerabilities

It is a popular belief that automated web application security scanners are not good enough. We even find some IT…

4 years ago

Hackers Attacking WebLogic Servers via CVE-2020–14882 Flaw to install Cobalt Strike Malware

Attackers are found to be exploiting Oracle WebLogic Servers via CVE-2020–14882 to install Cobalt Strike which will allow persistent remote…

4 years ago

OWASP top 10 Challenges 2020 – Security Risks and Vulnerabilities

OWASP is an online community that deals with different security challenges and OWASP stands for the "Open Web Application Security…

4 years ago

Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider

Web-based applications security relies on a number of factors among them is a Web Application Firewall (WAF). Cyberattacks are pouring…

5 years ago

TIDoS Framework -Web Penetration Testing Toolkit for Reconnaissance

Reconnaissance is a process to get information in-depth about the target. Keep gathering information until penetration testing phase is a…

6 years ago

Web Applications Penetration Testing: Tact’s & Methodology

Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web…

6 years ago

New Burp Suite Version 1.7.30 Released that adds Support to Scan for Individual Issues

Burp Suite is a graphical tool for testing Web application security. The tool is composed in Java and created by…

7 years ago

OWSAP TOP 10 – 2017 out for public comments

OWSAP presented Release Candidate for Top 10 2017 which add's two new vulnerabilities categories. Insufficient Attack Detection and Prevention. Underprotected…

8 years ago