Application attacks (buffer overflows, cross-site scripting)
Get the latest news and information on recognizing vulnerabilities and defending against application attacks and threats such as buffer overflows, cross site scripting, SQL injections.
New & Notable
Application attacks (buffer overflows, cross-site scripting) News
-
December 16, 2020
16
Dec'20
SolarWinds breach highlights dangers of supply chain attacks
While the scope of the breach is still unknown, the cyber attack on SolarWinds shows what can happen when sophisticated attackers target just one link of a software supply chain.
-
July 06, 2020
06
Jul'20
Critical F5 Networks vulnerability under attack
A critical remote code execution vulnerability that was disclosed and patched just days ago is already being exploited by threat actors.
-
June 25, 2020
25
Jun'20
Open source vulnerabilities down 20% in 2019
Snyk recently released its fourth annual 'State of Open Source Security' report, which analyzed open source statistics, vulnerability trends and security culture.
-
December 20, 2019
20
Dec'19
F5 Networks to acquire Shape Security for $1 billion
F5 Networks is acquiring Shape Security for approximately $1 billion in a move to strengthen its presence in the application security and anti-fraud markets.
Application attacks (buffer overflows, cross-site scripting) Get Started
Bring yourself up to speed with our introductory content
-
Quiz: Web application security threats and vulnerabilities
Applications are still the biggest attack vector for malicious actors -- can you protect them? Test your knowledge with this web application security quiz. Continue Reading
-
What are the top secure data transmission methods?
Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Continue Reading
-
process hollowing
Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code. Continue Reading
Evaluate Application attacks (buffer overflows, cross-site scripting) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Oversee apps with these 3 application security testing tools
Unsecured applications can have dire consequences for enterprises. Discover how top app security testing tools on the market today protect apps and enhance developer productivity. Continue Reading
-
Analyzing the top 2019 data breach disclosures: Hindsight in 2020
Make 2020 the year your company keep its resolution to avoid a data breach. Experts offer lessons learned from the top 2019 data breaches to help stay secure in the year ahead. Continue Reading
-
Who's to blame for ransomware attacks -- beyond the attackers?
Cyberattackers are to blame for ransomware attacks, but what about companies that release flawed software or don't install patches? Our expert looks at where the buck stops. Continue Reading
Manage Application attacks (buffer overflows, cross-site scripting)
Learn to apply best practices and optimize your operations.
-
12 Microsoft 365 security best practices to secure the suite
Migrating to or operating cloud-based Microsoft 365 can bring with it a host of problems and misconfigurations. Check out 12 best practices to tighten Microsoft 365 security. Continue Reading
-
Best practices for threat modeling service mesh, microservices
In microservices and service mesh environments, communications don't follow static paths. As such, security teams must update their application threat modeling methods. Continue Reading
-
What is shellcode and how is it used?
Shellcode is a set of instructions that executes a command in software to take control of or exploit a compromised machine. Read up on the malware term and how to mitigate the risk. Continue Reading
Problem Solve Application attacks (buffer overflows, cross-site scripting) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
3 steps to secure codebase updates, prevent vulnerabilities
Codebase updates are critical, but what about when they introduce vulnerabilities? These three steps will help app developers secure codebase updates and keep their apps safe. Continue Reading
-
'Secure by Design' principles include failures, exceptions
Using design principles with built-in security, along with properly defining exceptions, can help developers not only build safe code, but do so while meeting deadlines. Continue Reading
-
Exception handling best practices call for secure code design
Making software secure by design requires tremendous consideration about how failures are handled. Learn more from these exception handling examples. Continue Reading