Appsec Knowledge Base search Results

167 Results For : All Records
Understand file inclusion vulnerabilities and learn best practices to strength your web applications against attack.
Learn about port scanning, its protocols, security implications, and the importance of testing ports to secure your web applications. 
Detect and fix Privilege Escalation Vulnerabilities earlier in the software development life cycle to strengthen your software against attack.
SQL injection is a technique used to gain unauthorized access to data-driven applications. One of the more common hacking methods.
The term “system development life cycle,” or SDLC, is tossed around frequently, but many people have only a vague idea about what the process actually entails
An explanation of third-party software security, why it is important, and examples of recent data breaches involving third-party software.
Read about the concepts of wifi sniffer attacks and the tools and software available for detecting and preventing packet sniffers.