Tommy AdeoyeDon’t loose millions of dollars: Protect Your Business from BEC ScamsBusiness Email Compromise (BEC) scams are a growing threat in today’s ever evolving technology world. These sophisticated attacks target…Apr 17Apr 17
Tommy AdeoyeProtecting Your Website from HTTP/2 Rapid Reset Zero-Day Vulnerability(CVE-2023–44487)In the world of cybersecurity, new vulnerabilities are like hidden traps in a vast maze of digital information. One such trap that has…Oct 11, 2023Oct 11, 2023
Tommy AdeoyeUnderstanding XXE attacks: Dissecting the Threat and How to Protect Your Web ApplicationIn recent years, XXE attacks have become increasingly prevalent and are a significant security concern for web applications. An XXE attack…Mar 8, 20231Mar 8, 20231
Tommy AdeoyeThe Danger of Malicious Code Hidden with WhitespaceAs we rely more on technology in our daily lives, the threat of cyberattacks has become more prevalent. One of the techniques used by…Mar 3, 2023Mar 3, 2023
Tommy AdeoyeOptimizing Application Security Remediation through Batching: Applying Eric Ries’ Lean Startup…As technology continues to advance at a rapid pace, ensuring application security has become increasingly vital. With the proliferation of…Feb 24, 2023Feb 24, 2023
Tommy AdeoyeProactively Protecting Your Business: The Importance of Attack Resistance Management-ARMRecently, apple warned about three new vulnerabilities discovered that can affect iPhone, Mac, and iPad devices. These vulnerabilities pose…Feb 23, 2023Feb 23, 2023
Tommy AdeoyeMitigating Security Threats with AWS CloudFront: Preventing DDoS and Reconnaissance AttacksAs more and more businesses move their operations and data to the cloud, security concerns have become increasingly prevalent. Among the…Feb 16, 2023Feb 16, 2023
Tommy AdeoyeUnveiling the Importance of Cryptography: Understanding A02:2021 — Cryptographic FailuresThe A02:2021 — Cryptographic Failures , previously known as Sensitive Data Exposure in the 2017 OWASP Top 10 list, highlights the…Feb 15, 2023Feb 15, 2023
Tommy AdeoyeMaximizing Security with AWS: A Comprehensive Guide to AWS Security Tools and Their Use CasesAmazon Web Service — AWS, the biggest and top cloud service provider with about 32% of the total cloud service market, is a popular cloud…Feb 10, 2023Feb 10, 2023
Tommy AdeoyeThe Dangers of Inherently Dangerous Functions: Understanding CWE-242 and How to Avoid it in JavaCWE-242: Use of Inherently Dangerous Function is weakness classification in the Common Weakness Enumeration (CWE) system that identifies…Feb 8, 2023Feb 8, 2023