Top OATH API Vulnerabilities

Top OATH API Vulnerabilites

Top OATH API Vulnerabilities Top OATH API Vulnerabilities: Intro When it comes to exploits, APIs are the greatest place to start. API access usually consists of three parts. Clients are issued tokens by an Authorization Server, which runs alongside APIs. The API receives access tokens from the client and applies domain-specific authorization rules based on […]

What is Fuzzing?

What is fuzzing

What is Fuzzing? Intro: What is Fuzzing? In 2014, Chinese hackers hacked into Community Health Systems, a for-profit US hospital chain, and stole 4.5 million patients’ data. The hackers exploited a bug called Heartbleed that was discovered in the OpenSSL cryptography library some months before the hack. Heartbleed is an example of a class of […]

Top 10 Penetration Testing Tools

op 10 Pen testing tools 2022

Top 10 Penetration Testing Tools Top 10 Penetration Testing Tools: Intro A common hacking scene in movies is some nerdy-looking person, glasses and weird haircut, hunched over a laptop typing furiously with lines of code scrolling by on a multi-screen setup. The weird haircut and glasses part may be true sometimes, but the rest is […]

How Strong Is My Password?

How strong is my password

How Strong Is My Password? How Strong Is My Password? Having a strong password can be the difference between keeping the money in your bank account or not. A password serves as the primary access point to your online identity, much like your house keys do. That is why hackers are constantly on the lookout […]

Cybersecurity 101: What You Need To Know in 2022!

Cybersecurity 101: What You Need To Know! [Table of Contents] What is cybersecurity? Why is cybersecurity important? How does cybersecurity affect me? Cybersecurity 101 – Topics Internet / Cloud / Network security IoT & Household Security Spam, Social Engineering & Phishing How to protect yourself online & offline   [Quick Glossary / Definitions]* Cybersecurity: “measures […]

10 Ways To Protect Your Company From A Data Breach in 2022

Data breach

A Tragic History Of Data Breaches We have suffered from high profile data breaches at many big-name retailers, hundreds of millions of consumers have had their credit and debit cards compromised, not to mention other personal information.  The consequences of suffering data breaches caused major brand damage and range from consumer mistrust, a drop in […]