REST API Security Testing with Acunetix

Security vulnerabilities in RESTful APIs (Application Programming Interfaces) introduce the same risks as security issues in websites and other web applications: sensitive data theft, manipulation, and more. Therefore, it is very important to know how to test them efficiently. However, some characteristics of REST APIs…

Read more

What Is a Buffer Overflow

A buffer overflow vulnerability occurs when you give a program too much data. The excess data corrupts nearby space in memory and may alter other data. As a result, the program might report an error or behave differently. Such vulnerabilities are also called buffer overrun….

Read more

Visit Us at Black Hat USA 2019

Black Hat, founded by Jeff Moss (Dark Tangent), is one of the biggest and best-known cybersecurity conferences in the world. Organized in the USA since 1997 and in Europe and Asia since 2000, it is perceived as aimed at the corporate world but it caters…

Read more

PHP Security Guide

PHP remains the most popular server-side language for websites and web applications. According to the latest data from w3techs, it is used by 79% of websites whose server-side language is known. Therefore, secure PHP programming and configuration are of critical importance. There are more reasons,…

Read more