This blog is about different types of WebSocket Vulnerabilities/Findings. So, we will be discussing different types of flaws that may…
Before getting into the Mass Assignment vulnerability, let us know what exactly mass assignment is and where it is used.…
Since the threat landscape in the software development ecosystem is ever-evolving, we need to reconsider the security controls used throughout…
Introduction of Web Application Firewall (WAF) Security A web application firewall (WAF) is a security solution that provides rule sets…
Introduction GraphQL is one of the commonly used open-source manipulation and data query language for APIs, and runtime for implementing…
What is Cross-Site Request Forgery (CSRF)? Cross-Site Request Forgery (CSRF) is a widely known web security vulnerability that enables a…
Introduction: A security researcher, Mr. Omer Gil initially proposed Web cache deception attack in 2017. This attack takes advantage of…
What is an Insecure Direct Object Reference (IDOR) Risk? IDOR stands for Insecure Direct Object Reference occurring when an application…
What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows…
In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32…