What is CVE and CVSS – Known Vulnerability Scoring Explained
It is common to hear these days about a known vulnerability having been exploited with the end result being a massive data […]
What is Cross-Site Request Forgery (CSRF)?
Cross-site request forgery (CSRF) is an attack technique that exploits the trust that a web application has in a user’s browser. It […]
7 Types of Penetration Testing to Zero in on Vulnerabilities
A penetration test simulates the actions of a hacker in a cyber attack against your computer systems in order to find exploitable […]
Reflected XSS Cross-Site Scripting
What is Reflected Cross-Site Scripting (XSS)? Reflected Cross-Site Scripting vulnerabilities are a subcategory of XSS vulnerabilities. Reflected XSS attacks occur when an […]
Path Traversal (Directory Traversal) – Definition and Prevention
What is Path Traversal? A path traversal attack (also known as directory traversal) aims to access files and directories that are stored […]
Forced Browsing – Detection and Prevention
What is Forced Browsing? Forced browsing is an attack where the goal is to list and access resources that are not referenced […]