What is WAF? A web application firewall is a specific kind of application firewall that applies explicitly to web applications. It is released before web applications […]
In the last blog we had explored OWASP IoT Top 10 vulnerabilities overview, now we will explore the impact of each of these OWASP vulnerabilities on […]
With ever increases attack surfaces with IoT devices, physical hardening is also one of the important aspects of IoT Security. Many times these devices are being […]
What is OWASP? OWASP, also known as the Open Web Application Security Project, is an online platform that creates articles available freely, programs, documentation, tools, and […]
An Application Programming Interface (API) is a component that enables communication between two different applications. They can be applications developed on different platforms and it uses […]
Cross Site Scripting (XSS) is the most popular web application vulnerability. It is a code injection attack that allows attackers to execute malicious JavaScript code in […]
APIs (Application Programming Interfaces) are a crucial component of modern software systems, enabling different applications to interact with each other and share data seamlessly. However, just […]
This blog is about a technique used by attackers to perform a phishing attack by using the Tabnabbing. Although, this was technique was invented a long […]
Hi Readers, today we will learn about another interesting part of web services and API penetration testing part, this revolves around Security assessments of web services. […]