Cyber Security Blog

Its All About Ethics

Month: January 2020

Vulnerabilities Framework Latest

Vulnerabilities in Ruby-on-Rails Framework & How to prevent it: Ruby-on-rails—it’s modular, easy-to-read, and broadly supported by legions of loyal developers. Many of the world’s most trafficked websites have relied on Rails to deliver scalable and highly available web services. As Read more…

Vulnerabilities in Ruby

Vulnerabilities in Ruby-on-Rails Framework & How to prevent it: Ruby-on-rails—it’s modular, easy-to-read, and broadly supported by legions of loyal developers. Many of the world’s most trafficked websites have relied on Rails to deliver scalable and highly available web services. As Read more…

Vulnerabilities in play Framework

Vulnerabilities in play Framework Http only cookie bypass CVE-2015-2156 Description A vulnerability has been found in Play’s cookie handling code that could allow an attacker to bypass the httpOnly flag on sensitive cookies. Impact Any Play apps that reflect cookie values back Read more…

Vulnerabilities in meteor framework

Vulnerabilities in meteor framework Meteor, or MeteorJS, is a  free and open source isomorphic JavaScript web framework written using Node.js. Meteor allows for rapid prototyping and produces cross-platform (Android, ios, web) code. It integrates with MongoDB and uses the distributed data protocol and a  publish Read more…

Securing Email Servers Compliance

RCIE Course Modules: 3.10 Securing Email Servers Compliance What is email server security compliance? Securing your corporate email server is one of the most important aspects of ensuring compliance. With the rise in cyber-threats and the focus on phishing and Read more…

Penetration-TestingDJango Framework

DJango Framework: – INTRODUCTION: – Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Worked by experienced developers,it deals with tackling the different issues found during web development, so we can center around on Read more…