Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Injection attack-

Below you will find reports with the tag of “Injection attack-”

image from The 2018 Hacker Report

The 2018 Hacker Report

This report is a kind of dossier on the hacker community. It lets you in to their world, to know their mindset, and thoughts on the bug bounty community. (more available)
Added: October 20, 2018
image from State of the Internet/Security Q4 2015 report

State of the Internet/Security Q4 2015 report

This report gives a detailed breakdown of DDoS attacks in Q4 of 2015.
Added: October 19, 2018
image from 2016 Web Application Threat Trend Report

2016 Web Application Threat Trend Report

Readers are encouraged to use this report to get a better understanding of the current threat landscape, including trends specific to different contexts like region, time of day, industry, and more, in order to better fine-tune defenses for meeting the security needs of their unique environments. (more available)
Added: October 18, 2018
image from State of Software Security Volume 7

State of Software Security Volume 7

Veracode’s intention is to provide security practitioners with tangible AppSec benchmarks with which to measure their own programs against. They’ve sliced and diced the numbers to offer a range of perspectives on the risk of applications throughout the entire software lifecycle. (more available)
Added: October 18, 2018
image from The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

Don’t let Hollywood fool you: carrying out an attack doesn’t resemble the plot of an action movie. Attackers don’t automatically breach a network, immediately locate the information they want and then swiftly exit the organization. (more available)
Added: October 18, 2018
image from Top 5 Data Security Threats

Top 5 Data Security Threats

This Report takes a look at the top 5 data security threats and analyzes what a company can do about them. (more available)
Added: October 18, 2018
image from Past And Present Of Underground Network Industry

Past And Present Of Underground Network Industry

This document presents the definition, category, means, and examples of the underground network industry, as well as protection measures.
Added: October 17, 2018
image from Joao Malware Analysis

Joao Malware Analysis

This report provides analysis and information related to Joao Malware which has attacked video gamers.
Added: October 16, 2018
image from State of Software Security Volume 8

State of Software Security Volume 8

In this, the eighth volume of this report, they present metrics that are based on real application risk postures, drawn from code-level analysis of nearly 250 billion lines of code across 400,000 assessmnets performed over a period of 12 months between April 1, 2016 and March 31, 2017. (more available)
Added: October 16, 2018
image from Security Response: Insecurity in the Internet of Things

Security Response: Insecurity in the Internet of Things

The Internet of Things is becoming and area of danger for security risks. This paper discusses the cyber security issues related to the internet of things, and discusses how people should be taking action to protect their devices. (more available)
Added: October 15, 2018
image from CakePHP Security Assessment

CakePHP Security Assessment

This report is based on a study done in 2017 to analyze security issues in CakePHP.
Added: October 14, 2018
image from Cloud Security Report 2017

Cloud Security Report 2017

This report includes research on the evolving state of cloud security.
Added: October 14, 2018
image from The State of Bug Bounty 2016

The State of Bug Bounty 2016

This is an annual report that provides an inside look into the economics and emerging trends of bug bounties, with data collected from Bugcrowd’s platform and other sources throughout 2016. (more available)
Added: October 14, 2018
image from SQL Injection Attacks: Detection In A Web Application Environment

SQL Injection Attacks: Detection In A Web Application Environment

This whitepaper provides an excellent resource for understanding SQL Injection attacks, in a web application environment.
Added: October 13, 2018
image from 2018 State Of Bug Bounty Report

2018 State Of Bug Bounty Report

This annual report takes a look at the bug bounty industry in 2018.
Added: October 12, 2018
image from SQL Injection Defense: There are no Silver Bullets

SQL Injection Defense: There are no Silver Bullets

In this technical whitepaper they explain why there’s no single silver bullet answer to SQL injection.
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 22, 2023 16:09 UTC (build fa8bb0e)