Cloud Application Pen Testing

Cloud Application Pentesting With the growth of cloud computing, Penetration testing deployment is becoming bit difficult due to its shared responsibility model. Cloud computing brings concept of…

Wireless Security Devices Compliance

RCIE Course Modules: 3.9 Wireless Security Devices Compliance What are wireless security protocols? Wired Equivalent Privacy (WEP), (WPA) Wi-Fi Protected Access, Wi-Fi Protected Access 2…

Vulnerabilities Framework Latest

Vulnerabilities in Ruby-on-Rails Framework & How to prevent it: Ruby-on-rails—it’s modular, easy-to-read, and broadly supported by legions of loyal developers. Many of the world’s most…

Vulnerabilities in Ruby

Vulnerabilities in Ruby-on-Rails Framework & How to prevent it: Ruby-on-rails—it’s modular, easy-to-read, and broadly supported by legions of loyal developers. Many of the world’s most…

Vulnerabilities in play Framework

Vulnerabilities in play Framework Http only cookie bypass CVE-2015-2156 Description A vulnerability has been found in Play’s cookie handling code that could allow an attacker…