CopyPastehas never been so tasty!

Tag: “Web application security

Search Results(7 results)UserPost DateView
How MIT website got ...

MIT got hacked. Anonymous defaced the MIT to protest against the case of “Aaron S...

anonymous1/28/20136900
How MIT website got hacked despite ...

Without getting into who really hacked, the cause behind the hack, I just wanted to dissect it as an interesting case of multi-stage attack which prov...

anonymous1/28/20136400
Must Know Business Logic Vulnerabilit...

Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various ve...

anonymous1/25/20138000
Using 80-20 Rule in Ap...

80/20 rule (also known as Pareto Principle) is one of the most beautiful rules which hel...

anonymous1/24/20136600
Using 80-20 Rule in Ap...

80/20 rule (also known as Pareto Principle) is one of the most beautiful rules which hel...

anonymous1/24/20136300
Using 80-20 Rule in Application Securi...

#1: Know yourself before your enemy does. I remember in a recent conference the speaker asked the audience (mostly large enterprise secur...

anonymous1/24/20137200
Web Application Vuln...

With years of experience and valuable insights of our cloud based application security te...

anonymous1/18/20137100