What Is SEO Poisoning (Search Engine Poisoning)

What Is SEO Poisoning (Search Engine Poisoning)

Search engine optimization poisoning (SEO poisoning) is a term used to describe two types of activities: Illegitimate techniques used to achieve high search engine ranking, usually (but not only) to attack visitors ...
Common Password Vulnerabilities and How to Avoid Them

Common Password Vulnerabilities and How to Avoid Them

Weak passwords and password reuse are still some of the most serious concerns for cybersecurity. There are several ways to increase password security but they are often not adopted by users and ...
How To Build a Cyber Incident Response Plan

How To Build a Cyber Incident Response Plan

No matter how well you manage your cybersecurity, there is always a chance that you will become a victim of a cyber attack. That is why every organization, no matter the size, ...
What Is DNS Cache Poisoning

What Is DNS Cache Poisoning

DNS cache poisoning is a type of DNS spoofing attack where the attacker stores fake data in a DNS resolver cache. All clients that use this DNS cache receive such fake data ...
HTTP Security: A Security-Focused Introduction to HTTP

HTTP Security: A Security-Focused Introduction to HTTP

| | articles, Web Security Zone
HTTP is a ubiquitous protocol and is one of the cornerstones of the web. If you are a newcomer to web application security, a sound knowledge of the HTTP protocol will make ...
Cybersecurity Trends 2019 – Web Security

Cybersecurity Trends 2019 – Web Security

The year 2019 so far has seen its share of major security and data breaches. Unsurprisingly, they were not caused by new cybercriminal techniques but by the same ones that have plagued ...
Data Breaches Due to Exposed Databases

Data Breaches Due to Exposed Databases

The recent massive breach of sensitive Ecuador population data is yet another case, where there was no actual hack involved. The data owner, an Ecuadorian company Novaestrat, simply left an unsecured Elasticsearch ...
Using Logs to Investigate – SQL Injection Attack Example

Using Logs to Investigate – SQL Injection Attack Example

A log file is an extremely valuable piece of information that is provided by a server. Almost all servers, services, and applications provide some sort of logging. A log file records events ...
What Is IAST (Interactive Application Security Testing)

What Is IAST (Interactive Application Security Testing)

Interactive Application Security Testing (IAST) is a term for tools that combine the advantages of Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). It is a generic term, so ...
How a Hacker Convinced Motorola to Send Him Source Code

Red Team vs. Blue Team Exercises for Web Security

One of the best ways to verify the security posture of a business is to perform a mock attack. This principle is behind the concept of penetration testing (manual mock attack) and ...
Loading...