CALL US

+91 8219776763

Category: Web Application Security

Owasp top 10 A:9

Owasp Top 10:A9: Using Components With Known Vulnerabilities (Impact & Mitigation)

By Prempal Singh 0 Comment July 9, 2019

What does mean by “Components With Known Vulnerabilities” ? Web services often include a component with a known security vulnerability. When this happens, it falls into this category, no matter which component is vulnerable, which makes it a very frequent discovery. A component with a known vulnerability may be the operating system itself,the Content Management […]

SQL Injection

Owasp Top 10: A1: Injection Vulnerability (Impact & Mitigation)

By Prempal Singh 0 Comment July 9, 2019

What is an Injection ? An injection is a type of attack which usually occurs when an attacker sends some suspicious data as part of a query or command into the input fields of any website. By this attacker can lead to data theft, data loss, or accessing data without any authorization. Different Types of […]

New OWASP

Owasp Top 10:A2: Broken Authentication (Impact and Mitigation)

By Prempal Singh 0 Comment July 9, 2019

Owasp Top 10: Broken Authentication (Impact and Mitigation) What is Broken Authentication ? Broken Authentication is a vulnerability, it usually found when the web application gives you unauthorized access to the web application. It may be User authentication credentials Or session IDs and so on. Authentication and session management having all aspects of handling user […]

OWASP - Cyberops

What is OWASP? Top 10 Vulnerabilities?

By Prempal Singh 0 Comment June 11, 2019

The modern world carries thousands of threats and potential dangers at every step and every moment of time. The global network, which has become an integral part of our life, is no exception. Cyber crime is now more developed than ever – after all, almost every company has its own website on the Internet, and […]

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Prempal Singh 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment and penetration testing (VAPT) (What is VAPT), the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical […]

error: Content is protected by Cyberops !!