Common Types Of Network Security Vulnerabilities

Cyber ​​attacks become more and more sophisticated every year and cause serious financial and reputational damage. The damage affects all means of communication and blocks an organization for an extended period. For example, two of the most significant encryption viruses are Petya and Wanna Cry. They caused millions of losses in different areas of business … Read more

API Security Weekly: Issue 165

This week, we have news of another high severity vulnerability in a WordPress plugin, this time the popular All in One allowing compromise via the core REST API. We also have views from @apihandyman on why to treat all APIs as public ones, a comprehensive beginner’s guide to API security, and finally an optimism view … Read more

How to Find a Vulnerability in a Website

While website owners consider scalability and high performance to be supreme, the changing threat landscape requires security to be an equally crucial consideration. The first step to securing a vulnerable website is to identify application vulnerabilities and then take corrective actions to mitigate them. In this article, we explore how to find a vulnerability in … Read more

Angular + React: Vulnerability Cheatsheet

Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data storage, data transportation, API, and more. With all these components to secure, building a secure application can seem really daunting. Thankfully, most real-life vulnerabilities share the same root causes. By studying these common vulnerability types, why … Read more