Top 5 injection attacks in application security

Injection attacks work by including a payload in unvalidated user input and getting a vulnerable web application to execute it. This post lists the most common injection attacks against web applications and APIs, discusses the vulnerabilities that make them possible, and shows ways to detect and prevent such security issues.

Read more

Top 10 Mistakes when Performing a Web Vulnerability Assessment

In Information Technology there are numerous mistakes, oversights, and blunders that are repeated consistently day after day. But given what there is to lose when it comes to web application security, why not learn from the mistakes of others so you don’t get burned? This blog post lists the top 10 mistakes typical web application security experts do and that you need to be aware of when seeking out the real business risks in your web vulnerability assessments: