Hibernate Query Language (HQL) Injection

4 years ago

HQL is the abbreviation for Hibernate Query Language. Hibernate can be classified as ORM or Object-Relational Mapping. It maps class definitions…

WebSocket Vulnerabilities

4 years ago

This blog is about different types of WebSocket Vulnerabilities/Findings. So, we will be discussing different types of flaws that may…

Mass Assignment Vulnerability

4 years ago

Before getting into the Mass Assignment vulnerability, let us know what exactly mass assignment is and where it is used.…

ISO 27017- Information Security Control for Cloud Services

4 years ago

The use of cloud services is increasing worldwide as industries continue to grow. With this dynamic growth in cloud technology,…

Microsoft O365 Mobile Device Management (MDM)

4 years ago

In a hybrid work environment, employees may often work remotely using mobile devices. Since these mobile devices connect to corporate…

Secure Software Development Lifecycle (SDLC)

4 years ago

Since the threat landscape in the software development ecosystem is ever-evolving, we need to reconsider the security controls used throughout…

Let’s Protect Your Organization From Insider Threats

4 years ago

Among various cyber threats that organizations face, insider threats are the ones that are hard to detect. However, not all…

STATIC ANALYSIS OF ANDROID APPLICATION

4 years ago

Android applications are now an integral part of our lives, thanks to the excessive use of mobile phones. However, many…

Learning About Web Application Firewall (WAF) Security

4 years ago

Introduction of Web Application Firewall (WAF) Security A web application firewall (WAF) is a security solution that provides rule sets…

HIPAA Compliance Framework – A Guide for Implementation

4 years ago

The Health Insurance Portability and Accountability Act (HIPAA) has set the standard for sensitive and critical patient healthcare data protection.…