web application

Kia Security Flaw Exposed, NIST’s New Password Guidelines
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...
HTTP Parameter Pollution and Mass Assignment Attacks
This blog focuses on two important things: the HTTP parameter pollution attack and mass assignment vulnerability. It helps developers to understand the risks that web apps can face and how to make ...

Understanding CRLF Injection: A Web Application Vulnerability and Mitigation
CRLF (Carriage Return Line Feed) injection is a web application vulnerability that occurs when an attacker can inject malicious CRLF characters into an HTTP response. This vulnerability can lead to various security ...

Social Zombies Revisited: Your Friends Want to Eat Your Brains
On this week’s episode, We’re excited to bring you a classic conference talk that Tom Eston gave with co-host Kevin Johnson back in 2009 at DEF CON 17 in Las Vegas. The ...

Elevating Web App Security to a National Priority
It’s been an eventful few months in terms of sizable cyberattacks. First, we had the SolarWinds hack, then the Colonial Pipeline ransomware attack made cybersecurity acutely real for millions of people in ...

WAFaaS: When ‘As-A-Service’ Means ‘Bad Service’
In 1908, Henry Ford introduced the Model T – the world’s first mass-produced vehicle. In his quest to quickly mobilize Americans, Ford famously quipped that the car was available to his customers “in ...

Keyfactor, PrimeKey to Advance Certificate Automation
Keyfactor announced this week announced it intends to merge with PrimeKey as part of an effort to enable organizations to more easily manage certificates on an end-to-end basis. The company also revealed ...

Akamai Tool Detects Suspicious JavaScript Code
Akamai today launched Page Integrity Manager, an in-browser threat detection capability that discovers compromised instances of JavaScript running on a client. Patrick Sullivan, CTO for security strategy at Akamai, said this type ...

Serious Flaws Endanger Apps Built with Spring Framework
Developers of the popular Spring framework for developing Java web applications patched three vulnerabilities this past week, including a critical one that could be exploited for remote code execution. The most serious ...

Equifax’s Servers Reportedly Had Glaring Holes Long Before Data Breach
Equifax reportedly took six months to take down a publicly exposed web application that could have allowed anyone on the internet to search and download sensitive personal consumer data. VICE Motherboard reported ...