A ping of death is an attack on the Internet Control Message Protocol (ICMP)❗️ and Transmission Control Protocol (TCP)❗️, and is the most serious of the ICMP attacks.
👉In this article we will tell you what a DDoS attack is, describe the common types, and explain how to protect from them.
👉In this article, you will learn what Web API security is, why it is important for application security, and how basic security techniques can help secure APIs.
How to stop DDoS attacks with a small budget❓
👉In this article, you will learn what an Advanced Persistent Threat (APT) attack is, common tactics and security measures.
Learn how to track vulnerabilities, how the assessment process works☝️ Find out how to protect your organization from known vulnerabilities
👉Insider threats are the most common threat. Learn how to detect and defend against these attacks
👉In the continuation of the article on SQL injection, you will learn about the safety of infusion and prevention of such attacks.
SQL injection the most common attack by malefactors.🕵️♂️ Malicious code can reveal your information. Learn about the types of this attack and how to defend against it
👉In this article, you will learn what a honeypot is and its main types. How it can work to protect your network
DNS hijacking is a common cyber attack technique known as domain name server redirection.⚠️ The attacker's goal is to redirect the user to a malicious site.
Continuation of the first article. Here you will find out how DLP helps, what problems there are with preventing data loss☝️
Learn what Data Loss Prevention DLP is and prevent leakage of confidential information and important data🔎
The High Orbit Ion Cannon HOIC tool 🛠 for launching Dos and DDoS attacks. Stress application using HTTP traffic
Low Orbit Ion Cannon LOIC is an attacker tool 🛠 for launching DoS and DDoS attacks and overloading the server with malicious traffic. Find out how it happens and how to protect❓
In the continuation of the article, you will learn 🧐 what methods of protection against buffer overflow attacks exist. We will analyze each in detail. Part 2 of 2
In this article, we will look at what a buffer overflow is. How hackers use buffer overflows against you and what are the types of attacks. 💻 Part 1 of 2
In this article, you will learn how minification works.Ⓜ️ Learn more about techniques, tools and benefits of minification. Reduce the size of the code on the site
Slowloris opens multiple connections to the target server by continuously sending partial HTTP requests✔️
Man in the Middle MITM🕵️ is an attack in which a hacker can steal your data, transfer funds unauthorizedly and change passwords. Find out more in the article.
Learn difference between a Content Delivery Network (CDN) and a Web Accelerator. What is better and how it works❓
Malvertising is an advertisement that is used to spread a virus or malware to a user's computer. Learn how to protect yourself from it⚠️
In the second part of the article, you will learn how to deploy SIEM in your enterprise, what difficulties will arise. And why SIEM is so valuable.⚙️
Learn what Security Information and Event Management (SIEM) are, what are the tools. What is the difference between an SIEM and other security technologies.📒 Part 1 of 2
In this article, you will learn what methods of protection against phishing attacks exist. What the user should do❓
Learn how phishing attacks affect your business. What to do to prevent them❓ Common types of phishing scenarios⚠️
Learn about SOC 2 audit process. Audit regularly to ensure SOC 2. Provisioning and compliance.📋 Protect your clients' privacy. Part 2 of 2
Learn about SOC 2 compliance. Why it matters when choosing a SaaS provider❓ Protect your clients' privacy. Part 1 of 2
Find out what a penetration test is, what types are there and why they are needed. Improve your security solutions ❗️
👉 DMZ is a term that insinuates an association incorporating and protecting an affiliation's neighborhood from unapproved access.
👉 This article will save you the doubts and confusion about tools like OpenAPI and Swagger. Let's figure it out together.
👉 In this article, we'll talk to you about hybrid cloud. We'll understand what functions it performs, its benefits, and much more
👉 Multi-cloud implies a few diverse public mists are utilized to help at least one application. In this article we will explain what a multicloud is.
👉 In this article you will learn what SOAP and REST protocols are and what the difference between them is. A useful post for API developers
👉 The Helpful Guide: "How use the best api security testing tools". Text and video workshop for everyone!
👉 API security protects the integrity of applications owned and used by users. Let's explore this in more detail in this article
👉 This article will introduce you to gRPC, one of the latest developer approaches to API design that promises to solve problems that other design styles have failed to address.
👉 In this post, we will define HTTP/2, why it was needed, what are its advantages, why could it be disadvantageous, alongside the key differences between HTTP/2 and HTTP/1.1.
👉 In this post, we are trying to bring everything crucial related to WSDL with some real-time document examples.
👉 OpenAPI is playing a crucial role in evolving and leveraging the API economy as if you have anything to do with API economy and API development then knowing OpenAPI is imperative.
👉 GraphQL a highly useful query language making tons of things right for app developers and security managers. Let's take a closer look at this.
👉 "Insufficient logging and monitoring" is in hard to detect but it’s also hard to protect from. There are several ways we can protect ourselves from this vulnerability
👉 "A9: Using Components with Known Vulnerabilities", we are often talking about either outdated pieces of software or software that is not actively maintained anymore. Details in the article
👉 Insecure serialization has historically been considered a very difficult vulnerability to understand, in this article we will try to explain it to you in detail
👉 We will look at what it takes to look for all kinds of XSS (Cross-Site Scripting) attacks in all sorts of contexts but also at what we can do to stop this kind of attack
👉 In this article we will put together a general guide to testing security misconfigurations by looking at the common properties of all the problems we can find in the descriptions and actions.
👉 Access control is designed to grant or restrict rights to certain users in the application. It can become vulnerable.
👉 An XXE (XML External Entities) attack occurs when malicious actors send off data in one of the XML formats they have control over. Let's take a closer look at this vulnerability
👉 In this article we will talk about kinds of sensitive information exposure going from debug information to admin passwords.
👉 When authentication problems arise, it is always fraught with dire consequences. As you will see in this article, it can be fatal for any business. Explore A2:Broken Authentication
👉 There is a range of different injection vulnerabilities that can occur and we will be discussing them in this article. Explore a vulnerability such as A1:Injection
👉In this article, we will tell you about such a threat as Insufficient Logging and Monitoring. Let's take a look at what it is, an attack scenario, ways to detect and defend it.
👉In this article, we will tell you about such a threat as Improper Assets Management. Let's take a look at what it is, an attack scenario, ways to detect and defend it.
👉In this article, we will tell you about such a threat as Injection. Let's take a look at what it is, an attack scenario, ways to detect and defend it.
👉Security Misconfiguration might lead to an attacker being able to fully take over all the infrastructure. Let's take a closer look at this.
👉In this article, we will tell you about such a threat as Mass Assignment. Let's take a look at what it is, an attack scenario, how to detect and protect them.
👉In this article, we are going to tell you about Broken Function Level Authorization. This vulnerability can be quite complex and varied.
👉In this article, we will tell you about such a threat as Lack of Resources Rate Limiting. Let's take a look at what it is, an attack scenario, how to detect and protect them.
👉In this article, we will tell you about such a threat as Excessive Data Exposure. Let's consider what it is, examples of threats, ways to detect and protect them.
👉In this article, we will tell you about such a threat as Broken User Authentication. Let's consider what it is, examples of threats, ways to detect and protect them.
👉In this article, we will tell you about such a threat as Broken Object Level Authorization. Let's consider the types of attacks, examples of threats, how to detect and defend against them.
👉In this article, we will explain what continuous integration and continuous delivery is. What role does security play in CI CD pipelines?
👉Border Gateway Protocol is the routing protocol that helps the Internet to work. BGP exchanges routing information across autonomous systems AS.
👉In this article, you will realize what the genuine implications of MTU and MSS are including what they mean for web network for the client.
👉API testing entails various different aspects and goes much further than simply executing a few test cases. In this article we will tell you all about API testing.
👉Today i would like to take a moment to show you my top 10 best practices in API testing. Find out about them in the article
👉Malware is malicious software used by hackers to destroy and gain access to confidential information. Learn more in article
👉 SaaS is short form for Software-as-a-Service applications which runs in the cloud. Let's figure out what it is
👉In this article, you will learn what XSS is. What are the types of cross-site scripting. Why is it dangerous and how to protect
👉Learn how you can protect personal identifying information in web applications. PII is information can identify an individual
👉 In this article, we'll be investigating ATO (Account Takeover) and distinguishing the entirety of its key components. Let's get started.
👉 A path attack is an aggressor who sits in the middle between two stations and can intercept or change the data that is being transmitted through the organization.
👉 In this article we will talk about Remote File Inclusion, an attack that targets vulnerabilities in web applications.
👉 Find out in our article what anti-phishing tools exist today. Choose the right tool to prevent phishing attacks.
👉 Remote code execution is a term describing a cyber attack in which an attacker can take sole control of another person's computer.
👉 Internet provider fracture attacks are an ordinary kind of renouncing of organization attack, in which the offender overbears an association by exploiting datagram irregularity frameworks.
👉 Drive by attacks - is dangerous to the reputation of an organization and the privacy of the users. Let's take a closer look at this attack.
👉 In this article, we'll audit the importance of a Trojan Horse infection, its various kinds and avoidance of the PC malware.
👉 In this article, we will talk about a zero-day attack is an obscure security weakness or programming blemish that a danger entertainer can focus with noxious code.
👉Who are black hat hackers and how are they dangerous? How to protect your business from them? We'll cover these issues in this article.
👉Who are the gray hat hackers and why are they so important? We will analyze these questions in this article.
👉Eavesdropping is the theft of information transmitted over the network. What harm it can bring, read this article.
👉 DDoS SMURF attack that overload a server with Ping requests. Let's take a closer look at this.
👉In this article, we will tell you what Booters, Stressers, and DDoSers are. How can they cause problems for Internet users?
👉In this article, you will learn what data breach is. What are the types of leaks and how to protect yourself and your organization from data leaks.
👉In this article we will explain to you what a captcha is. What are captchas and how they protect networks from bots
👉In this article, you will learn what bots are, what types there are. How to detect this kind of traffic and how to protect from it.
👉A "UDP flood" is any assault in which the assailant floods IP packs giving UDP datagrams to the weak ports. In this article, we will describe this attack in detail.
👉Hackers use IP address spoofing to gain unauthorized access to your computer. Find out more in this article.
👉In this article, you will learn what DNS spoofing and Cache Poisoning are. How these attacks work and how to protect your DNS records❓
👉In this article, you will learn what ransomware is, examples of such programs, how to detect, protect and remove them.
👉Syn Spoofing or TCP Reset Attack is a type of attack in which attackers send forged TCP RST (Reset) packets to the host.
👉In this article, you will learn what Google Hacking is. How cybercriminals extract confidential information using the Google search engine.
👉In this article, we will talk about the TOP tools for Kubernetes CI / CD. Since today they increasingly began to combine Kubernetes with CI / CD devices
👉Kubernetes is a versatile, extensible, open-source stage for overseeing containerized responsibilities and administrations that work with revelatory arrangement and mechanization.
👉In this article, we'll be investigating the rudiments of PCI Compliance, its prerequisites, and strategies that associations receive to guarantee PCI consistency and keep a solid network safety.
👉The OSI model can assist you with seeing how information streams across and inside networks. Let's take a closer look at what it is.
👉Figure out how to incorporate security into the devsecops pipeline and have security as a need consistently.
👉A DevOps toolchain structures a solitary design by consolidating various devices utilized at various phases of improvement, conveyance and support of the code. Let's take a closer look at this.
👉In this article, we'll take a look at the best DevOps tools. For convenience, we have divided according to the area in which they showed their best side
👉Learn all about DevOps. How DevOps Helps Improve Automation and Collaboration to Deliver Apps to Customers Faster
👉In this article, you will learn what data anonymization is, what are the methods, advantages and disadvantages of anonymization.
👉In this article, you will learn about the similarities and differences between DevOps and DevSecOps development best practices.
DevSecOps is DevOps that includes information security technologies👆 In this article, we will explain the role of DevSecOps in continuous development
👉ACL is a list of rules that control which clients or hosts are permitted to access your service. Learn the important points.
👉In this article, we will tell you what Anycast is, a network addressing method that redirects incoming requests to different locations to reduce latency.
👉In this article, you will learn what a recovery point objective RPO is, how it helps to recover data after destruction. Learn how to correctly identify and much more.
👉In this article, you will learn what types of data classification are, what they are for and how they help organizations.
👉In this article, you will learn one hundred such role based access control RBAC. Read How RBAC Can Improve Security Compliance
👉 The first is a group of outside security experts who play out the elements of both red and blue groups. Learn more about the Purple Team in this article.
👉 Peruse on to learn key contrasts between pen testing and vulnerability scanning and choose what suits you
👉 In this article, we hope to clear the typical twisting and highlight the differentiations between Vulnerability Assessment and Penetration Testing.
👉A penetration tester is a professional that carries out simulated cyber-attacks against security systems to determine possible shortcomings. Do you want to become a penetration tester❓
👉In this article, we'll treat everything about Application Penetration check including a portion of its well-known apparatuses.
👉We have prepared a list of the best penetration test tools for 2021 for you. Read the article for details.
📋White Box Testing is software testing, or rather internal code and infrastructure. Learn all about this testing method in this article.
👉In this article, we will explain to you the concept of Penetration Test. What are the stages, pros and cons. It's important to do a penetration test.
👉 In this article, we'll present the idea of business logic flaws and clarify how they can emerge because of imperfect suppositions about client conduct.
👉 In this article, you'll find out about the various sorts of rootkits, how to identify them, and get them out of your gadget.
👉A persistent problem for WordPress sites is the XML-RPC file. In this article we will tell you what to do with it and why it is worth paying attention to.
👉Common Vulnerabilities and Exposures (CVE) is a glossary that categorizes various kinds of weaknesses. Let's take a closer look at this.
👉We can characterize data lineage as the information's life cycle or the full information venture. Let's take a closer look at this topic.
Wallarm helps you develop fast and stay secure.