OWASP TOP 10: Insecure Direct Object Reference

Insecure Direct Object Reference allows attackers to manipulate references to gain access to unauthorized data. OWASP is a non-profit organization with the goal of improving the security of software and the internet. We...

Time-Based Blind SQL Injection Attacks

Time-based techniques are often used to achieve tests when there is no other way to retrieve information from the database server. This...

Meet Detectify this summer! | Detectify Blog

We’ve got some cool events coming up and we’re looking forward to discussing security at tech conferences, meetups and webinars. Check out this blog post for a complete list of events...

Facebook Fined $660,000 Over Cambridge Analytica Scandal

The U.K. Information Commissioner’s Office exacted a $660,000 fine against Facebook on Tuesday for its inability to keep the information of up...

How To Jailbreak iOS 11 / 11.1.2 Using LiberiOS

Here’s a tutorial on the best way to jailbreak iOS 11 to iOS 11.1.2 on iPhone X and different gadgets utilizing LiberiOS...

Hackers Attack Gas Station and Stole 600 Gallons of Gas

Posted on July 10, 2018 at 11:37 AM In the sea of completely incredible news these days, one has to be singled out, simply because it generated probably the greatest gas station...

Boolean Based Blind SQL Injection on MySQL : How to Do Manually

This article will guide you on how to do Blind Boolean SQL Injection. It is also known as Inference technique. As I...

[Alert] Stored XSS in WordPress Plugin Jetpack

Sucuri recently discovered a stored XSS in all versions from 2.0 (released in November 2012) of the popular WordPress plugin Jetpack. The plugin has over 1 million active installs and is made by Automattic,...

LATEST NEWS

MUST READ