Web Application Security
Test and evaluate your WAF before hackers
Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most common application security technologies available on the market. Since the last century, WAFs have evolved by ...
6 Essentials for a Near Perfect Cyber Threat Intelligence Framework
Software developers face a constant barrage of cyber threats that can compromise their applications, data, and the security of their organizations. In 2023, the cyber threat The post 6 Essentials for a ...
Introducing the Wallarm 2024 API ThreatStatsTM Report
The Wallarm Security Research team is pleased to share the latest version of our API ThreatStats report. This report serves as a key resource for API, Application security practitioners. It emphasizes the ...
Webinar: Join us for the latest in API Threats on January 24, 2024
In today's complex digital landscape, the security of APIs has become paramount. As we move into 2024, it's essential to stay ahead of the evolving API security threats and vulnerabilities. The upcoming ...
What is XML-RPC? Benefits, Security Risks, and Detection Techniques
vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the context of the webserver. This may facilitate various attacks The post What is XML-RPC? Benefits, Security Risks, ...
7 Examples of SSRF and How to Protect Yourself from It
It’s unsettling to think that our systems can betray us. With SSRF attacks, harmless-looking web requests turn into weapons for cybercriminals. They can exploit vulnerabilities from The post 7 Examples of SSRF ...
Top 10 CI/CD Security Tools
On the one hand, your sales department is pushing for new features at an alarming rate, forcing you into faster deployment processes. On the other hand, The post Top 10 CI/CD Security ...
What is the ‘Zenbleed’ Exploit and 7 Ways to Prevent it Now
In 2018, the discovery of the Meltdown and Spectre CPU vulnerabilities sent shockwaves through the tech industry. These hardware flaws allowed attackers to steal sensitive data The post What is the ‘Zenbleed’ ...
How to plan Web Penetration Testing : A guide in 2023
Introduction Navigating the complex terrain of web penetration testing can be daunting. As an experienced penetration tester specialising in web application security, I can assure you that one of the most valuable ...
What is Web Application Security Testing?
Web application penetration testing describes the process of simulating an unobtrusive attack against a web application. It allows companies to understand vulnerabilities that are easy to miss during the development process. These ...