Kubernetes Kubernetes, also known as K8s, is a portable, extensible, open-source orchestration tool for automating deployment, scaling, and management of containerized applications. LDAP Injection LDAP injection is a code injection technique used to exploit web applications which could reveal sensitive user information or modify information represented in the LDAP (Lightweight Directory Access Protocol) data stores. Local File Inclusion (LFI) Local File Inclusion (LFI) is the process of including files that are already stored locally on the server. Logout Management Logout management refers to the process of having secure session termination controls that governs interactions between a web-based application and users. Low and Slow There are several known tools that are available for perpetrators to launch low and slow attacks including Slowloris, SlowPOST, SlowHTTPTest, Tor’sHammer, R.U.Dead.Yet and LOIC. Mail Command Injection Mail Command Injection is an attack technique used to exploit mail servers and webmail applications that construct IMAP/SMTP statements from user-supplied input that is not properly sanitized. Microservices Microservices, also known as microservice architecture, is an architectural style that structures an application as a collection of services that are loosely coupled and independently deployable. Mobile Application Security: Top 10 Threats & 6 Defensive Measures Mobile application security involves protecting mobile apps from external threats such as malware and data leaks Previous ... 7 8 9 10 11 12 ... Next 7 8 9
Kubernetes Kubernetes, also known as K8s, is a portable, extensible, open-source orchestration tool for automating deployment, scaling, and management of containerized applications.
LDAP Injection LDAP injection is a code injection technique used to exploit web applications which could reveal sensitive user information or modify information represented in the LDAP (Lightweight Directory Access Protocol) data stores.
Local File Inclusion (LFI) Local File Inclusion (LFI) is the process of including files that are already stored locally on the server.
Logout Management Logout management refers to the process of having secure session termination controls that governs interactions between a web-based application and users.
Low and Slow There are several known tools that are available for perpetrators to launch low and slow attacks including Slowloris, SlowPOST, SlowHTTPTest, Tor’sHammer, R.U.Dead.Yet and LOIC.
Mail Command Injection Mail Command Injection is an attack technique used to exploit mail servers and webmail applications that construct IMAP/SMTP statements from user-supplied input that is not properly sanitized.
Microservices Microservices, also known as microservice architecture, is an architectural style that structures an application as a collection of services that are loosely coupled and independently deployable.
Mobile Application Security: Top 10 Threats & 6 Defensive Measures Mobile application security involves protecting mobile apps from external threats such as malware and data leaks