Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Web Application

Below you will find reports with the tag of “Web Application”

image from Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

This guide was written as a follow-up to “Monitoring 101.” It seeks to provide further more advanced information about Monitoring, the challenges and the successes that can be had.

(more available)
Added: October 18, 2018
image from Network Attached Security Attacking A Synology NAS

Network Attached Security Attacking A Synology NAS

Network-Attached Storage (NAS) devices are a popular way for people to store and share their photos, videos and documents. Securing these devices is essential as they can contain sensitive information and are often exposed to the Internet. Because Synology is one of the top manufacturers of NAS devices, this paper chose to analyze a Synology DS215j. In doing so it identifies a number of exploitable security flaws. In this paper, they discuss in detail the analysis performed, methodologies used, and vulnerabilities found during the summer of 2015.

(more available)
Added: October 18, 2018
image from UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

This paper takes a look at the cities of the United Kingdom, and the cyber threats that occurred there.

Added: October 18, 2018
image from Authentication Survival Guide

Authentication Survival Guide

This book aims to be an accessible starting point for everyone that is starting to work with authentication. In this book, you’ll find a concise review of all the key protocols, formats, concepts and terminology that you’ll likely come across when implementing authentication.

(more available)
Added: October 17, 2018
image from Cyber Risk Report 2015

Cyber Risk Report 2015

The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

(more available)
Added: October 17, 2018
image from HTTPS/SSL White Paper

HTTPS/SSL White Paper

For many organizations, dealing with HTTPS traffic is something of a double edge sword. Recent moves to encryption challenge the status quo in terms of organizational oversight. Finding a balance between competing interests will be critical to moving forward, but while present technology limitations hamper those efforts, technological advancements can enhance them.

(more available)
Added: October 15, 2018
image from Best Practices For Web Application Firewall Management

Best Practices For Web Application Firewall Management

The experts at TrustWave have prepared this report to outline the issues and practices for web application firewall management.

Added: October 14, 2018
image from How Software Composition Analysis Could Have Prevented The Equifax Breach

How Software Composition Analysis Could Have Prevented The Equifax Breach

This white paper takes a look at the Equifax breach of 2017 and offers a unique analysis at what could have prevented it.

(more available)
Added: October 13, 2018
image from SQL Injection Attacks: Detection In A Web Application Environment

SQL Injection Attacks: Detection In A Web Application Environment

This whitepaper provides an excellent resource for understanding SQL Injection attacks, in a web application environment.

Added: October 13, 2018
image from Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

As security measures get better at detecting and blocking both malware and cyberattacks, adversaries and cybercriminals are forced to constantly develop new techniques to evade detection. One of these advanced techniques involves “fileless" exploits, where no executable file is written to disk. These attacks are particularly effective at evading traditional antivirus (AV) solutions, which look for files saved to disk so they can scan them and determine if they are malicious. This report discusses these issues.

(more available)
Added: October 13, 2018
image from 2016 Trustwave Global Security Report

2016 Trustwave Global Security Report

This report summarizes the goals and activities of the initiative, the history and status of the initiative and key cyber value-at-risk concept foundations.

(more available)
Added: October 12, 2018
image from 2018 State Of Bug Bounty Report

2018 State Of Bug Bounty Report

This annual report takes a look at the bug bounty industry in 2018.

Added: October 12, 2018
image from Cyber Threats To The Construction And Engineering Industries

Cyber Threats To The Construction And Engineering Industries

Learn why the construction and engineering sectors are high profile targets for state-sponsored threat actors engaged in cyber espionage.

Added: October 12, 2018
image from Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

This paper investigates many observable characteristics of web-servers that may affect the likelihood of compromise.

Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)