blog

112 Results / Page 12 of 13

common API vulnerabilities

today

close

Cybersecurity + blog Z. Oualid

10 most common API security attacks

APIs are the new most popular way to make complex and scalable web applications. According to the community forum programmableweb.com in 2015 they have listed 12,000 APIs in their directory, and in early 2019 they discovered that the number has gone to nearly 22,000, which prove the rapid growth in ...

breach of data

today

close

Cyber attack + blog Z. Oualid

Breach of Data | the companies nightmare

With the rapid advancement in technology, businesses of all sizes have become increasingly reliant on workforce mobility, cloud computing, the Internet of Things (IoT), and digital media. Data breach have gained widespread popularity as sensitive business data is stored on local machines, cloud servers, and enterprise databases. So what is ...

SQL injection attack

today

close

How to + blog Z. Oualid

SQL INJECTION ATTACK PREVENTION IN PHP | CODE EXAMPLES

After several years of penetration testing and working with development teams to secure their systems, I have noticed that there was no complete blog post that gives a detailed explanation of how to prevent SQL injection attacks in all the most popular web application development languages and frameworks. Therefore, I ...

GDPR meaning

today

close

Cybersecurity + Laws + blog Z. Oualid

GDPR meaning and compliance steps

If you have a website or you are thinking about starting one, then you have definitely heard about the GDPR and you also heard that you will need to comply with it. So what is the meaning of GDPR? GDPR “The General Data Protection Regulation” is a European regulation for ...