Subscribe to our Blog

Get the Latest Application Security News and Content

Vulnerabilities

SSRF - Server-Side Request Forgery

Intro Server-Side Request Forgery (SSRF) attacks allow an attacker to make requests to any domains through a vulnerab...

29.04.2020

Vulnerabilities

How DOM XSS Attacks work

According to various research and studies, up to 50% of websites are vulnerable to DOM Based XSS vulnerabilities. Sec...

16.03.2020

Vulnerabilities

The most common LDAP Injections and how they work

In the first part of the LDAP Injections blog, we talked about the basics. The definition of LDAP Services, how they ...

18.02.2020

Vulnerabilities

Introduction to LDAP Injection

What is LDAP? Information technologies keep progressing at incredible speed. This entails an increase in the amount o...

11.02.2020

Vulnerabilities

Operating System Command Injection vulnerabilities and the danger they present

Today we’ll discuss Operating System Command Injection vulnerabilities. How much of a threat are they? How can you pr...

20.01.2020

Subscribe to our Blog

Get the Latest Application Security News and Content

Vulnerabilities

Local File Inclusion (LFI) - What is LFI and how to deal with it

What is Local File Inclusion (LFI)? Today we will be discussing Local File Inclusions, LFI for short. First things fi...

15.01.2020

Vulnerabilities

Discovering and remediating Open Redirect Vulnerabilities

What is an Open Redirect Vulnerability? An Open Redirect Vulnerability entails an attacker manipulating the user and ...

14.01.2020

Vulnerabilities

What is an XML External Entity (XXE) Injection?

XML external entity injection, also known as XXE attacks, is one of the most common security vulnerabilities in web a...

16.12.2019

Vulnerabilities

The Basics and Prevention of Blind SQL Injections

Blind SQL injections occur when a web application is exposed to SQL injection, but it’s HTTP responses don̵...

11.12.2019

Vulnerabilities

What is a Cross-Site Request Forgery (CSRF) Attack & How It can be prevented

Cross-site Request Forgery (CSRF/XSRF), also known as Sea Surf or Session Riding is a web security vulnerability that...

09.12.2019

Vulnerabilities

What are SQL Injections and How can they be prevented

SQL injections represent a code injection technique used to attack applications and the data they hold. They usually ...

01.11.2019

Vulnerabilities

DOM XSS: What Is DOM-based Cross-Site Scripting And How can you Prevent it?

DOM XSS stands for Document Object Model-based Cross-site Scripting. This kind of XSS attack occurs when an applicati...

23.10.2019