The General Data Protection Regulation (GDPR) is a cyber security framework introduced by the European Union (EU) on May 25th, 2018. It is the most stringent […]
The healthcare industry is becoming increasingly reliant on technology, with electronic medical records, online appointment scheduling, and telemedicine becoming common practices. However, as technology becomes more […]
Enterprise security systems continue to be targeted by the meticulous and sophisticated modern-day cyber-criminal. These attacks target and exploit areas of vulnerabilities such as cloud systems, […]
What is Log4J? Log4j is an open-source logging utility offered by Apache Software Foundation. This logging library is widely used by businesses in its application to […]
What is WebSocket? Efficient two-way communication protocol WebSocket is stateful where HTTP is stateless Two main parts: Handshake and data transfer WebSockets allows the client/server to […]
Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]
In this blog, let’s dive deep into PHP Deserialization Vulnerability on how to identify the serialization and exploit the vulnerability in PHP applications. The deserialization vulnerability […]