What Is DNS Cache Poisoning

What Is DNS Cache Poisoning

DNS cache poisoning is a type of DNS spoofing attack where the attacker stores fake data in a DNS resolver cache. All clients that use this DNS cache receive such fake data. It can be used for very effective phishing attacks (often called pharming) and... Read More → The post ... Read More
Cybersecurity Trends 2019 – Web Security

Cybersecurity Trends 2019 – Web Security

The year 2019 so far has seen its share of major security and data breaches. Unsurprisingly, they were not caused by new cybercriminal techniques but by the same ones that have plagued information security for up to two decades. Social engineering and cyberattacks on web... Read More → The post ... Read More
Data Breaches Due to Exposed Databases

Data Breaches Due to Exposed Databases

The recent massive breach of sensitive Ecuador population data is yet another case, where there was no actual hack involved. The data owner, an Ecuadorian company Novaestrat, simply left an unsecured Elasticsearch database exposed on a publicly accessible server in Miami. The database contained data... Read More → The post ... Read More
What Is IAST (Interactive Application Security Testing)

What Is IAST (Interactive Application Security Testing)

Interactive Application Security Testing (IAST) is a term for tools that combine the advantages of Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). It is a generic term, so IAST tools may differ a lot in their approach to testing web application... Read More → The post ... Read More
How a Hacker Convinced Motorola to Send Him Source Code

Red Team vs. Blue Team Exercises for Web Security

One of the best ways to verify the security posture of a business is to perform a mock attack. This principle is behind the concept of penetration testing (manual mock attack) and vulnerability scanning (automatic mock attack). While penetration tests and vulnerability scans are performed... Read More → The post ... Read More
What Is Same-Origin Policy

What Is Same-Origin Policy

Same-Origin Policy (SOP) is a rule enforced by web browsers, which controls access to data between websites and web applications. Without SOP, any web page would be able to access the DOM of other pages. This would let it access potentially sensitive data from another... Read More → The post ... Read More
Where Cybersecurity Frameworks Meet Web Security

Where Cybersecurity Frameworks Meet Web Security

A cybersecurity framework is a set of guidelines for business environments to manage security effectively. Cybersecurity frameworks usually cover multiple aspects of cybersecurity, including security controls, appropriate safeguards, appropriate activities, protective technology, as well as response planning. They can be applied to various information systems... Read More → The post ... Read More
Government-in-the-Middle and Its Consequences

Government-in-the-Middle and Its Consequences

In late July, the government of Kazakhstan attempted to perform a mass man-in-the-middle attack on Kazakh citizens. Users of all Kazakh mobile networks were asked to install a government-issued CA certificate to continue using selected sites such as Google services, Facebook, and Instagram. Under global... Read More → The post ... Read More
What Is a Reverse Shell

What Is a Reverse Shell

To gain control over a compromised system, an attacker usually aims to gain interactive shell access for arbitrary command execution. With such access, they can try to elevate their privileges to obtain full control of the operating system. However, most systems are behind firewalls and... Read More → The post ... Read More
Penetration Testing vs Vulnerability Scanning

Penetration Testing vs Vulnerability Scanning

Businesses often perceive vulnerability scanning as an alternative to penetration testing. This perception is wrong. An organization conscious about cybersecurity must include both these activities in their business processes and make sure that they work in unison. Missing out on one of them greatly decreases... Read More → The post ... Read More