Insecure Default Password Hashing in CMSs

Insecure Default Password Hashing in CMSs

Christoforos Ntantogian, Stefanos Malliaros, and Christos Xenakis from the Department of Digital Systems in the University of Piraeus (Greece) conducted research on password hashing in open-source web platforms including the most popular ...
What Is OS Command Injection

What Is OS Command Injection

OS command injection (operating system command injection or simply command injection) is a type of an injection vulnerability. The payload injected by the attacker is executed as operating system commands. OS command ...
What Are Email Injection Attacks

What Are Email Injection Attacks

It is common practice for web pages and web applications to implement contact forms, which in turn send email messages to the intended recipients. Most of the time, such contact forms set ...
Hackers: The Third Pillar of Security

Hackers: The Third Pillar of Security

Independent hackers are the third pillar of security, which is often not treated seriously enough. Every business knows that to maintain security, you need the primary pillar: the right employees. Some businesses ...
Current Cybersecurity Market Strong: What’s Driving It?

Current Cybersecurity Market Strong: What’s Driving It?

Cybersecurity is a big business and it’s going to get bigger. Individual users, small business owners, and IT professionals at international corporations know that threats occur every day. Staying ahead of those ...
REST API Security Testing with Acunetix

REST API Security Testing with Acunetix

Security vulnerabilities in RESTful APIs (Application Programming Interfaces) introduce the same risks as security issues in websites and other web applications: sensitive data theft, manipulation, and more. Therefore, it is very important ...
Test Your XSS Skills Using Vulnerable Sites

Test Your XSS Skills Using Vulnerable Sites

Finding and proving application security vulnerabilities requires a lot of skill. However, many of them are easy to exploit. If you want to write better code, you should know how others may ...
What Is a Buffer Overflow

What Is a Buffer Overflow

A buffer overflow vulnerability occurs when you give a program too much data. The excess data corrupts nearby space in memory and may alter other data. As a result, the program might ...
Authentication Bypass in WP Live Chat

Authentication Bypass in WP Live Chat

WP Live Chat for WordPress is a very popular plugin used by many companies to provide online support. Currently, it has more than 50000 active installations. Very recently, researchers from Alert Logic ...
A Typo Can Make You an Administrator

A Typo Can Make You an Administrator

You are a developer. You put a lot of effort into making sure that your code is safe. You never trust user input, you use the best security-related development libraries. And then ...
Loading...