Welcome to the seventh installment of our blog series on “Insufficient Attack Protection.” In this edition, we shine a spotlight on the growing concern of CAPTCHA […]
Simple Object Access Protocol (SOAP) Overview: Simple Object Access Protocol (SOAP) is a Connection or an interface between the web services or a client and web […]
What is the meaning of an origin? Two websites are said to have same origin if both have following in common: So, sites http://example.com and http://example.com/settings have […]
What is WAF? A web application firewall is a specific kind of application firewall that applies explicitly to web applications. It is released before web applications […]
In the last blog we had explored OWASP IoT Top 10 vulnerabilities overview, now we will explore the impact of each of these OWASP vulnerabilities on […]
With ever increases attack surfaces with IoT devices, physical hardening is also one of the important aspects of IoT Security. Many times these devices are being […]
What is OWASP? OWASP, also known as the Open Web Application Security Project, is an online platform that creates articles available freely, programs, documentation, tools, and […]
An Application Programming Interface (API) is a component that enables communication between two different applications. They can be applications developed on different platforms and it uses […]
Cross Site Scripting (XSS) is the most popular web application vulnerability. It is a code injection attack that allows attackers to execute malicious JavaScript code in […]