Insecure CORS Configuration Background concept of CORS. Cross-origin resource sharing (CORS) is a mechanism that allows using resources from any other domain. So, Read More » February 16, 2023 4:22 pm
SSL STRIPPING Hello Everyone,Hope Everyone is safe and secure. Today we are going to discuss about SSL Stripping. What is SSL STRIPPING?SSL Read More » February 16, 2023 4:22 pm
Does INDIA has its own HIPPA Compliance? The Main Reason of Complying to Compliances and Standards are to 1) Ensure Confidentiality, Integrity and Availability of the Data Read More » February 16, 2023 4:22 pm
Capture the Flag (CTF) Tutorial: My File Server 1 So, today we are going to show you can solve the Capture the Flag (CTF) My File Server 1, Vulnhub.com Read More » February 16, 2023 4:22 pm
5 Common BurpSuite Extension | Automation for deserialization Greeting Everyone ! Hope Everything Is Going Well Today In This Blog We Will Explore About 5 Common Extension Which Read More » February 16, 2023 4:22 pm
How Application Are Vulnerable For Improper Session Management | Securium Solutions Greeting Everyone ! Hope Everything Is Going Well Today In This Blog We Will Explore Common Security Issue Which related Read More » February 16, 2023 4:22 pm
XSS Through SVG File Upload Greeting Everyone! Today In This Blog we will Explore Another XSS Victor Which Is Possible through SVG file Upload Functionality Read More » February 16, 2023 4:22 pm
XXE using external entities to retrieve files Greeting Everyone ! Hope Everything Is Going Well And Good Today in this blog we will explore XXE attack Which Read More » February 16, 2023 4:22 pm
Authentication bypass via OAuth implicit flow Hello Greeting Everyone ! Today in this Blog We will Explore How OAuth implicit flow Authentication schema Vulnerable if it Read More » February 16, 2023 4:22 pm