Solutions
 

Application Security

Cyberattack and cybersecurity terms related to application security

Multiple Encoded Attack

Multiple encoded attack is a technique used to bypass security mechanisms which only decodes user data input once.


Negative Security Model

A negative security model defines what is forbidden and accepts the rest. It is the opposite of a Positive Security Model which defines what is allowed and rejects the rest.


Nginx DoS

NGINX is open source software for reverse proxying, HTTP load balancing, media streaming, caching and serves as an email proxy for IMAP, POP3 and SMTP.


Null Byte Injection

Null Byte Injection is an active exploitation technique used to bypass sanity checking filters in web infrastructure by adding URL-encoded null byte characters (i.e. %00, or 0x00 in hex) to the user-supplied data.


OAuth2 Attack

The OAuth 2.0 authorization framework is a protocol that allows a user to grant a third-party web site or application access to the user's protected resources, without necessarily revealing their long-term credentials or even their identity.


OWASP API Top 10 Threats & 10 Ways to Mitigate Them

The OWASP API Security Top 10 is a list of the ten most critical security risks for APIs, updated in 2023. The risks include Broken Object Level Authorization, Broken Authentication, Broken Object Property Level Authorization, and Unrestricted Resource Consumption.


Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia