Blog

Category: Types of Vulnerabilities
May 17, 2023
by
Omkar Hiremath

Risk of Security and Monitoring Logging Failures

Read More
May 1, 2023
by
Omkar Hiremath

Intro to Identification and Authentication Failures

Read More
Dec 22, 2022
by
Warren Moynihan

3 Types of XSS Attacks & 4 XSS Mitigation Strategies

Read More
Dec 19, 2022
by
Shimon Brathwaite

3 Ways Attackers Leverage User Enumeration

Read More
Sep 26, 2022
by
Shimon Brathwaite

The Risks in Vulnerable and Outdated Components

Read More
Sep 19, 2022
by
Shimon Brathwaite

Top 5 Third Party Security Risks

Read More
Sep 6, 2022
by
Omkar Hiremath

Rise of Commodity Attacks & How to Mitigate Risk

Read More
Jul 25, 2022
by
Omkar Hiremath

Introduction to Cryptographic Failures

Read More
Jul 18, 2022
by
Shimon Brathwaite

Why OWASP Top 10 is Moving from Individual Vulnerabilities to Categories

Read More
Jul 11, 2022
by
Omkar Hiremath

Introduction to Server Side Request Forgery (SSRF)

Read More
Jul 4, 2022
by
Shimon Brathwaite

How OWASP is Shifting From Mitigating Risks to Encouraging Best Practices

Read More
Jun 6, 2022
by
Shimon Brathwaite

The Rise of Island Hopping Attacks

Read More
1 2 3

Like what you see?

Join 3000+ followers for the latest on managing application security in emerging technologies.
Office

301 Moodie Dr. Unit 108
Ottawa ON K2H 9C4

Designed by WP Expert
© 2023
Software Secured
cross