Please turn on your JavaScript for this page to function normally.

web application security

Web servers and sites under attack via ImageMagick zero-day flaw

A zero-day remote code execution flaw has been found in ImageMagick, an image processing library that allows image uploads from untrusted users (site visitors) and is widely …

broken glass
Top 10 web hacking techniques of 2015

Now in its tenth year, the Top 10 List of Web Hacking Techniques takes a step back from the implications of an attack to understand how they happen. The list is chosen by the …

DDoS
New application level attack bodes ill for hybrid DDoS protection

Imperva has recently witnessed a new type of DDoS attack they believe might become a go-to for cyber criminals looking to take sites and services down. The attack was an …

Acunetix
Web application security with Acunetix

Securing the web applications of today’s businesses is perhaps the most overlooked aspect of securing the enterprise. Web application hacking is on the rise with as many as …

Magnify
Web application scanning with Htcap

Htcap is a free web application scanner that can crawl single page applications in a recursive manner by intercepting Ajax calls and DOM changes. The app is focused mainly on …

Repeat DDoS and web application attacks become the norm

Akamai Technologies has shared the latest DDoS and web application attacks numbers in its Q4 2015 State of the Internet report. DDoS attack activity at a glance During Q4, …

tax
Security audit identified risky e-filing tax services

The Online Trust Alliance (OTA) evaluated the privacy, security and consumer protection practices of the thirteen IRS-approved free e-filing tax services. After an assessment …

Business
IRS raises number of Get Transcript app breach victims yet again

Remember when back in May 2015 the IRS took offline its Get Transcript app because it was misused by cybercriminals to access sensitive personal information of more than …

Broken glass
E-commerce web apps vulnerable to hijacking, database compromise

High-Tech Bridge researchers have published details and PoC exploit code for several serious vulnerabilities in Osclass, osCmax, and osCommerce, three popular open source …

money
Fighting malware monetization and application vulnerabilities

As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data – without …

Hands
Know your enemy: The most popular hacking methods

Outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally, according to Balabit. 54% of the survey respondents …

SQL injection has surfaced as the no. 1 attack in 2015

A new survey from Ponemon Institute finds that nearly 80 percent of enterprises say that their organization’s portfolio of applications has become more vulnerable to …

Don't miss

Cybersecurity news