Blog

OWASP TOP 10: INJECTION VULNERABILITY

Information security Injection vulnerabilities are usually vulnerabilities caused by command execution or user data inclusion…

Twitter hack: What went wrong and why it matters?

Twitter hack: What went wrong and why it matters?  Cyber risk is rated at #5…

Overview Of The Red Team Concept-3

Another example for Red Teaming is physical penetration. It’s easy to fake an employee’s card,…

Missing Function Level Access Control

Missing Function Level Access Control The essence of this vulnerability, as the name suggests, is…