Resources > Publications

WebShark: A complete web application security solution

WebShark is a next generation security solution designed to stop constantly evolving threats by preventing malicious attacks targeting your website before they impact your business. Unlike other vendors, we focus on all type of web application vulnerabilities including Sensitive Data Exposure and Security Misconfiguration to build a complete security solution for E-Commerce, Online Banking, corporate and personal websites. It takes about 30 seconds to configure and use. We build the next generation security solution - a complete web application security solution which is able to protect web applications (DVWA, Mutillidae, Bricks, etc.) which have hundreds of in-build vulnerabilities.

What is the Cybersecurity plan for tomorrow?

What have been done so far and what are the plans for tomorrow.

CAN YOU PREDICT WHO'LL WIN THE US ELECTION?

Who would win the battle for the White House to become the next President of the United States was a topic of hot debate in 2012. Much of that debate was taking place online, with plenty of people blogging, tweeting or updating social media with their thoughts on Mitt Romney versus Barack Obama. This provided us with a rich source of information about what people were thinking and feeling about the election race.

CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011

Cross-Site Request Forgery (CSRF in short) is a kind of a web application vulnerability which allows malicious website to send unauthorized requests to a vulnerable website using active session of its authorized users. In simple words, it’s when an “evil” website posts a new status in your twitter account on your visit while the login session is active on twitter.

BEST PRACTICES OF WEB APPLICATION SECURITY

Web Application Security is a vast topic and time is not enough to cover all kind of malicious attacks and techniques for avoiding them, so now we will focus on top 10 high level vulnerabilities.
Web developers work in different ways using their custom libraries and intruder prevention systems and now we will see what they should do and should not do based on best practices.