Blog
OWASP TOP 10: INJECTION VULNERABILITY
Information security Injection vulnerabilities are usually vulnerabilities caused by command execution or user data inclusion…
Twitter hack: What went wrong and why it matters?
Twitter hack: What went wrong and why it matters? Cyber risk is rated at #5…
Overview Of The Red Team Concept-3
Another example for Red Teaming is physical penetration. It’s easy to fake an employee’s card,…
Missing Function Level Access Control
Missing Function Level Access Control The essence of this vulnerability, as the name suggests, is…