Cross-site scripting

What is cross-site scripting? Cross-Site Scripting or XSS flaw is similar to SQL injection where an attacker finds the vulnerable parts of website code to target the confidential data like user login details, credentials or financial information. It also uses scripts...
Self-managed servers

Self-managed servers

Problem Sometimes companies prefer self-managed servers more than those professional management teams who make servers have a better performance. Because they just want to decrease their budgets and simply think that self-managed servers are able to be truly...
Database security threats and solutions

Database security threats and solutions

Privilege Abuse Uncontrolled or unrestricted liberty can cause issues for the privacy of end users. For example, a specific individual can get the advantage of accessing users’ account details without users’ authorization. Solution The solution for excessive...
SSL endpoint vulnerabilities

SSL endpoint vulnerabilities

Browser Exploit Against SSL/TLS (BEAST) The BEAST attack can easily compromise block cipher due to reason that using older versions of Secure Socket Layer protocol or Transport Layer Security protocol. Hackers can target intimate information by using a...
SSL certificate vulnerabilities

SSL certificate vulnerabilities

The SSL certificate vulnerabilities could be caused by certificate name mismatch, internal names, and missing fields of the certificate. The detailed introduction of each is as follows:   Certificate name mismatch The SSL certificate vulnerabilities could be caused by...

Improvements for cyber security operations center

What is CSOC? CSOC stands for Cyber Security Operations Center and it is also known as other names. It has an essential role in protecting the business from unofficial events happening in the network and it contains the services such as monitoring & recording,...