PRASADStatic Application Security Testing (SAST)-Checkmarx OneIn this article we will do source code review with the help of SAST tool for application. We upload application source code for scanning…5d ago5d ago
PRASADWeb Cache Poisoning AttackDefinition : Web Cache Poisoning is a type of web application security vulnerability that occurs when an attacker injects malicious data…Jun 12Jun 12
PRASADThe Next Frontier: What to Learn After Web, API, Mobile, and Cloud for Every Pen TesterAs a penetration tester, you’ve likely mastered the basics of web, API, mobile, and cloud security. You’ve learned how to identify…Jun 7Jun 7
PRASADCode Quality Metrics You Must KnowHigh-quality code is a necessity for developers, benefiting themselves, their team, customers, and professional growth. It fosters…May 20May 20
PRASADJavaScript Dependency InjectionDid You Know… Approximately 98% of websites employ JavaScript for their client-side scripting, and about 80% utilize a third-party…May 10May 10
PRASADCertificate Review : Certified Application Security Engineer | CASE .NET (312–95)This course is designed for individuals interested in source code review. It provides insights into how applications are developed and…Mar 3Mar 3
PRASADOWASP — Mobile Top 10 -2024After a considerable duration, OWASP has released the Mobile 10 attack; the previous release was in 2016.Feb 26Feb 26
PRASADinSystem WeaknessLarge Language Model (LLM) Pen testing — Part IIn the dynamic and fast-paced field of cybersecurity, the concept of Pentesting Large Language Models (LLMs) has surfaced as a fresh and…Feb 81Feb 81
PRASADSSL Pinning — The Right Way to Secure AppRecently, our development team has incorporated SSL pinning certification into our Kotlin-based Android application. This step, which is…Feb 3Feb 3
PRASADSpring Security with REST APIWhen you encounter a piece of code for the first time, it may initially appear to be vulnerable. However, it’s important to remember that a…Jan 11Jan 11