• Community
    • Join Discord
    • Industry News
    • Discussions
    • Contact & Support
  • Learn
    • 🧪 Hands-On Labs
    • Featured Courses
    • All Courses
    • Categories
      • Cybersecurity Fundamentals
      • Networking Security
      • Application Security
      • Ethical Hacking
      • Cloud Security
  • Resources
    • Blog
    • Ebooks
    • Podcasts
    • Webinars
  • Pricing
  • About Cybr
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Community
      • Join Discord
      • Industry News
      • Discussions
      • Contact & Support
    • Learn
      • 🧪 Hands-On Labs
      • Featured Courses
      • All Courses
      • Categories
        • Cybersecurity Fundamentals
        • Networking Security
        • Application Security
        • Ethical Hacking
        • Cloud Security
    • Resources
      • Blog
      • Ebooks
      • Podcasts
      • Webinars
    • Pricing
    • About Cybr
    Sign in Sign up

    Tag: OWASP Top 10

    Request Forgeries for the Security+

    Request forgeries (CSRF, XSRF, SSRF)

    In 2020, CheckPoint Research announced multiple vulnerabilities in the popular social media application named TikTok. One of the found vulnerabilities allowed an attacker to delete…

    Christophe September 1, 2023
    0 Comments
    Directory / Path traversal for the Security+

    Directory / Path Traversal

    Just like you have directories on your PC, laptop, and mobile phones, web servers also have directories. For example, if you were to purchase web…

    Christophe August 29, 2023
    0 Comments
    Running SAST tooling

    Static Application Security Testing (SAST)

    What if you could take multiple senior developers and security experts, distill them into a tool, and then have the ability to run that tool…

    Christophe July 7, 2023
    0 Comments
    SQL Injections Explained Series

    What are SQL Injections? // Explained in 180 seconds

    Whenever you visit a website or use some kind of application, that website or app needs to pull data from a database. For example, let’s…

    Christophe May 17, 2023
    0 Comments

    What is Cross-Site Scripting (XSS)?

    According to both OWASP and CWE, Cross-Site Scripting is one of the top 10 most dangerous web application security risks, and for good reason: OWASP’s…

    Christophe December 7, 2020
    0 Comments
    People discussing getting started securing applications

    4 steps to getting started securing applications

    A lot of times, especially when you join smaller organizations, there are no (or very few) formal processes in place. The approach taken to secure…

    Christophe September 26, 2020
    0 Comments
    Backdoor with Weevely and Commix

    Uploading Backdoor Shells with Weevely and Commix

    Now that we’ve reviewed OS Command injection concepts like how they work, the impact they can have, and techniques that can be used to exploit…

    Christophe September 22, 2020
    0 Comments
    Install OWASP Juice Shop on Kali Banner

    Set up the OWASP Juice Shop on Kali with Docker [Quickest Method]

    Installing the OWASP Juice Shop on Kali with Docker is super fast because you don’t have to install anything but Docker. It also makes cleaning…

    Christophe July 20, 2020
    10 Comments

    What is Information Leakage, and how do you prevent it?

    One of the most commonly found flaws in web applications and mobile applications is information leakage. But what is information leakage, why is it a…

    Christophe June 15, 2020
    0 Comments

    The 3 Most Common Mobile Application Security Risks

    Considering our reliance on mobile applications for our day-to-day personal and professional lives, mobile application security should be taken seriously, but unfortunately isn’t always. Especially…

    Christophe June 8, 2020
    0 Comments
    Load More

    Get notified of new posts

    Recent Posts

    • AWS CloudTrail Best Practices (Checklist and Cheat Sheet)
    • AWS Security Hub: Getting Started
    • AWS Security Services (Cheat Sheet)
    • Understanding malware classification
    • Incident response process

    Categories

    • Advanced
    • Announcements
    • Application Security
    • Beginner
    • Career
    • Certifications
    • Cloud Security
    • Community
    • Cybersecurity
    • Cybersecurity Fundamentals
    • Ethical Hacking
    • Explained Series
    • Incident Response
    • Intermediate
    • Network Security
    • Programming Languages
    • Scripting

    Recent Comments

    • Christophe on Performance-based Questions #1
    • Patrione on Performance-based Questions #1
    • Christophe on Study techniques that will help you pass
    • Anthony on Study techniques that will help you pass
    • l4stpl4y3r on Amazon CloudWatch
    Cybr logo badge
    © 2023 - Cybr, Inc
    • Contact
    • Courses
    • Discord
    • Terms of Service
    • Privacy Policy

    Report

    There was a problem reporting this post.

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts

    Please allow a few minutes for this process to complete.

    Report

    You have already reported this .