This Vulnerability in phpMyAdmin Lets An Attacker Perform DROP TABLE With A Single Click!

Most of you are familiar about Cross Site Request Forgery (CSRF) vulnerability, it is one of the most common vulnerabilities; it was listed in OWASP Top 10 – 2013. Previously, I had found and reported CSRF in an Intel website, by exploiting that vulnerability an attacker could remove items from an authenticated user’s shopping cart. […]

What Is a Firewall? Why Do You Need One For Your Personal Computer?

Firewall is software / hardware which blocks/ allows network traffic based on pre defined rules. A firewall is helpful to home users and enterprise users to avoid unwanted network traffic and allow only trusted communications by trusted softwares/apps. Firewall is your first and most important pal when it comes to the security of your information. […]

Protect Your MongoDB – Story of “The Same Database”

It’s normal now to hear stories about data breaches. Some of them involve publicly exposed Databases, S3 buckets etc. The vulnerability falls into ‘Security Misconfiguration’, A6 – OWASP Top 10 (2017). ” Attackers will often attempt to exploit unpatched flaws or access default accounts, unused pages, unprotected files and directories, etc to gain unauthorized access […]

[Incident Response]: How To Stay Protected From A Ransomware Attack like Wannacry?

More than 99 Countries, Thousands of companies and networks have been hit by a ransomware known as WannaCry. It is one of the most dangerous and potentially destructive cyber attacks we have ever seen. Some users clicked these photos, which suggests how dangerous and ubiquitous wannacry is. It has affected Airports, Hospitals, Restaurants, Railway Stations also disrupting services for millions of […]

Back To Top