Active vs Passive Reconnaissance in Cyber Security
Cyber Reconnaissance is an advanced form of cyber security intelligence gathering which involves gathering as much information about a target as possible […]
What is Cross-Site Request Forgery (CSRF)?
Cross-site request forgery (CSRF) is an attack technique that exploits the trust that a web application has in a user’s browser. It […]
Sanitizing vs Encoding vs Escaping
Quite frankly, I cannot count how many times I’ve seen these 3 terms mixed up by folks at all levels in both […]
7 Types of Penetration Testing to Zero in on Vulnerabilities
A penetration test simulates the actions of a hacker in a cyber attack against your computer systems in order to find exploitable […]
Forced Browsing – Detection and Prevention
What is Forced Browsing? Forced browsing is an attack where the goal is to list and access resources that are not referenced […]
The Ultimate 2022 WordPress Website Security Checklist
WordPress is the world’s most popular and widely used content management system, powering over 40% of all websites. It is also the […]
What is SSL?
Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), are protocols for maintaining a secure internet connection and protecting any […]