What Is Secure Coding?

A Lack Of Security Training Contributes To Growing Vulnerability Numbers The number of vulnerabilities that exist in production software is growing rapidly. In 2019 alone, over 22,000 new... Go on to the site to read the full article ... Read More
Fundamentals of Blockchain Security

Fundamentals of Blockchain Security

Introduction The goal of blockchain is to create a fully decentralized, trustless digital ledger. This is an ambitious goal since most ledger systems in use today, such as those used to track bank... Go on to the site to read the full article ... Read More

Blockchain Security Overview

Introduction Despite being over a decade old, blockchain has only really taken off within the last few years. During this time, it has moved from a fad to the subject of serious research by a number... Go on to the site to read the full article ... Read More

Do you need a master’s degree in cybersecurity?

Introduction One of the greatest challenges in landing a job in any field is demonstrating that you possess the knowledge and experience required for the role. This is especially true in... Go on to the site to read the full article ... Read More
How to scan email headers for phishing and malicious content

How to scan email headers for phishing and malicious content

Introduction Phishing emails are one of the most common attack vectors used by cybercriminals. They can be used to deliver a malicious payload or steal user credentials from their target.... Go on to the site to read the full article ... Read More
Integer Overflow and Underflow Vulnerabilities

Integer Overflow and Underflow Vulnerabilities

Introduction to integer overflows and underflows Integer overflow and underflow vulnerabilities are considered the eighth most dangerous vulnerability in the Common Weakness Enumeration (CWE) Top 25... Go on to the site to read the full article ... Read More
Race Condition Vulnerabilities

Race Condition Vulnerabilities

Introduction to race conditions Race condition vulnerabilities are an artifact of parallel processing. The ability to run multiple different execution threads in parallel can create vulnerabilities... Go on to the site to read the full article ... Read More
Buffer Overflow Vulnerabilities

Buffer Overflow Vulnerabilities

Introduction to buffer overflows Buffer overflows are considered the most dangerous vulnerability according to the CWE Top 25 list in 2019. They received a score of 75.56, almost 30 full points... Go on to the site to read the full article ... Read More

Introduction to the OWASP API Top Ten

| | General Security
The OWASP Project The Open Web Application Security Project (OWASP) is best known for its list of the top ten web application vulnerabilities. This list is updated every few years and is designed to... Go on to the site to read the full article ... Read More

What is NoSQL injection?

| | Hacking
Introduction to injection Injection attacks are considered some of the most dangerous types of vulnerabilities in existence. According to the OWASP Top Ten List of web application vulnerabilities,... Go on to the site to read the full article ... Read More