2021 CWE Top 25 Most Dangerous Software Weaknesses
Introduction: The 2021 CWE Top 25 Most Dangerous Software Weaknesses is a demonstrative list of most periodic and critical errors that can lead to major software vulnerabilities. It is developed…
Cyber Security
Introduction: The 2021 CWE Top 25 Most Dangerous Software Weaknesses is a demonstrative list of most periodic and critical errors that can lead to major software vulnerabilities. It is developed…
Introduction: Application Security Testing is a process to identify security vulnerabilities and weaknesses in web applications. This testing is performed with the combination of both automation and manual process using…
Google has warned approx. 14,000 Gmail users about being attacked by government-backed phishing campaign conduct by Fancy Bear, or APT28, a Russian government cyber espionage group. Google communicated to Gmail…
Introduction: Mobile phones have entered into every aspect of user’s life today, from communication and data to shopping and entrainment. To keep strong hold in the market, companies keep bringing…
Overview: There are several Cyber Security requirements that should be considered before the development of any kind of application. Organizations must ensure that any new software application project or changing…
Overview: This document defines a systematic process of STRIDE Methodology used in organizations to find security threats and prevent them to build a secure application or system. The main goal…
What is OWASP? The OWASP (Open Web Application Security Project) was established in 2001 as an open-source security community focused on the goal of circulating application security awareness. OWASP is…
Overview: This document defines the structured methodology of Application Threat Modeling used in organizations that identify, enumerate and prioritize mitigations for the security vulnerabilities related to the application. It will…
Introduction: Secure Software Development Life Cycle (S-SDLC) methodology is the need of the hour for the organizations to adapt to ensure that their software is Secured and all the security…
The Open Web Application Security Project (OWASP) released a draft edition of all-new OWASP Top 10 – 2021 Vulnerabilities list on its official website for peer review. The list contains…