Beagle Security
Product & Solutions
BY USE CASE
API Security Testing
GraphQL Security Testing
DevSecOps
Compliance
Cosmog: Private Tunnel
WordPress Security Testing
OWASP Security Testing
Free Security Testing
BY INDUSTRY
SaaS
Fintech
Healthcare
Education
E-commerce
BY ROLES
Developers
Security Engineers
Enterprise
Gain the visibility you need to manage security risks across your enterprise applications & APIs
Resources
RESOURCE CENTER
Blog
Newsletter
Vulnerability Index
Guides
Whitepapers
FREE TOOLS
Website Security Assessment
SSL Certificate Checker
Domain Expiry Checker
HELP AND SUPPORT
Help Center
Developer Hub
Company
COMPANY
About Us
Get in Touch
Careers
Life at Beagle
Experience our vibrant culture where innovation meets an adventurous, collaborative and supportive environment.
Partners
Features
Pricing
Product tour
Log in
Sign up free
Back
Latest articles
Stay up-to-date with the most recent insights and developments in the world of application security. Our latest articles cover cutting-edge techniques, emerging threats, and innovative solutions to help you fortify your applications.
Vulnerability
06 Dec 2023
Email address disclosure
Febna V M
Cyber Security Engineer
AppSec
04 Dec 2023
Why DAST needs reinvention?
Neda Ali
Product Marketing Specialist
Cyber attacks
28 Nov 2023
Domain spoofing: Types and how to prevent them
Gincy Mol A G
AI Engineer
Vulnerability
28 Nov 2023
The DROWN attack
Prathap
Co-founder, Director
Vulnerability
27 Nov 2023
Remote file inclusion
Febna V M
Cyber Security Engineer
AppSec
21 Nov 2023
Authenticated vs unauthenticated scans
Neda Ali
Product Marketing Specialist
AppSec
16 Nov 2023
What is SaaS penetration testing?
Neda Ali
Product Marketing Specialist
Vulnerability
14 Nov 2023
Eval injection
Sooraj V Nair
Cyber Security Engineer
Vulnerability
14 Nov 2023
Virtual hosts vulnerability
Febna V M
Cyber Security Engineer
Secrets Management
13 Nov 2023
Secrets at the Command Line
Nash N Sulthan
Cyber Security Lead Engineer
DevSecOps
12 Nov 2023
DevSecOps Vs SecDevOps
Neda Ali
Product Marketing Specialist
Secrets Management
08 Nov 2023
Secrets in Terraform
Manieendar Mohan
Cyber Security Lead Engineer
Secrets Management
08 Nov 2023
Secrets in Jenkins
Adheeb A
DevSecOps Engineer
Vulnerability
08 Nov 2023
What is HTTP Response Header Injection?
Neda Ali
Product Marketing Specialist
Vulnerability
08 Nov 2023
Insecure Redirection
Neda Ali
Product Marketing Specialist
Vulnerability
08 Nov 2023
What is Shellshock vulnerability?
Neda Ali
Product Marketing Specialist
Secrets Management
07 Nov 2023
Secrets in Kubernetes
Nash N Sulthan
Cyber Security Lead Engineer
Secrets Management
07 Nov 2023
Secrets in AWS
Sooraj V Nair
Cyber Security Engineer
Secrets Management
07 Nov 2023
How to handle secrets in Python?
Jijith Rajan
Cyber Security Engineer
Secrets Management
06 Nov 2023
How to handle secrets in docker?
Febna V M
Cyber Security Engineer
Secrets Management
06 Nov 2023
A guide to Secrets operations (SOPS)
Manieendar Mohan
Cyber Security Lead Engineer
owasp
20 Oct 2023
Broken Access Control
Manieendar Mohan
Cyber Security Lead Engineer
SSL
20 Oct 2023
ROBOT Attack (Breitenbacher RSA)
Nikhil Anilkumar
DevSecOps Engineer
Vulnerability
20 Oct 2023
Format String Vulnerability
Jijith Rajan
Cyber Security Engineer
Phishing
04 Oct 2023
What is phishing and how to stay safe?
Neda Ali
Product Marketing Specialist
DOMECTF
03 Oct 2023
DOME CTF: Boosting ethical hacking & Beagle Security platform’s R&D
Neda Ali
Product Marketing Specialist
AppSec
10 Sep 2023
7 limitations of vulnerability scanners
Neda Ali
Product Marketing Specialist
Clickjacking
10 Sep 2023
Clickjacking attack
Jijith Rajan
Cyber Security Engineer
AI
29 Jun 2023
Vulnerability management using AI
Ragesh K R
AI Engineer
AppSec
25 Jun 2023
Benefits of credentialed scans
Neda Ali
Product Marketing Specialist
AppSec
30 May 2023
Why DAST should be the cornerstone of your application security pro...
Neda Ali
Product Marketing Specialist
AppSec
08 Mar 2023
What are the common REST API security vulnerabilities?
Sooraj V Nair
Cyber Security Engineer
AppSec
06 Feb 2023
The 7 Best Veracode Alternatives in the Market Today
Nandagopal S
Marketing Associate
web security
26 Jan 2023
DAST vs SAST: What are the differences and how to combine them
Febna V M
Cyber Security Engineer
web security
11 Jan 2023
The Role of Bug Tracking in Ensuring Your Web Application's Security
Rapti Gupta
Head of Marketing, Bugasura
web security
04 Jan 2023
What is continuous penetration testing? Benefits & implementation
Nandagopal S
Marketing Associate
Compliance
28 Dec 2022
Personal Data Protection bill explained with seven expert opinions
Deepraj R
Content Specialist
web security
19 Dec 2022
Crucial Components for a Web Application Security Assessment
Febna V M
Cyber Security Engineer
HTTP headers
11 Dec 2022
Access Control Request Headers
Nikhil Anilkumar
DevSecOps Engineer
XML Injection
06 Dec 2022
XML Injection
Nikhil Anilkumar
DevSecOps Engineer
openssl
02 Nov 2022
Patch released for the critical OpenSSL vulnerability (CVE-2022-360...
Deepraj R
Content Specialist
Press
29 Sep 2022
Beagle Security is now a CERT-In Empaneled Information Security Aud...
Rejah Rehim
Co-founder, Director
DOMECTF2022
26 Sep 2022
DomeCTF 2022
Deepraj R
Content Specialist
Cyber attacks
18 Aug 2022
How CISCO got Attacked by Yanluowang Ransomware Gang
Deepraj R
Content Specialist
web security
18 Jul 2022
Zero-Day Vulnerabilities in Web Applications
Gincy Mol A G
AI Engineer
DevSecOps
10 Jul 2022
How DevSecOps is a Key Enabler for Digital Transformation
Sooraj V Nair
Cyber Security Engineer
owasp
04 Jul 2022
OWASP top ten 2017
Sooraj V Nair
Cyber Security Engineer
XSS
29 Jun 2022
WordPress Plugin Reflected Cross Site Scripting
Febna V M
Cyber Security Engineer
SQL Injection
29 Jun 2022
WordPress Authenticated SQL Injection
Jijith Rajan
Cyber Security Engineer
Press
28 Jun 2022
Beagle Security named a Leader in G2 Summer 2022 Reports
owasp
24 Jun 2022
Missing Function Level Access Control OWASP 2013
Febna V M
Cyber Security Engineer
SSL
24 Jun 2022
Lack of HTTP Strict Transport Security(HSTS)
Febna V M
Cyber Security Engineer
CSRF
24 Jun 2022
Cross-site request forgery attack
Rejah Rehim
Co-founder, Director
HSTS
22 Jun 2022
HTTP Strict Transport Security (HSTS) header set to less than six m...
Febna V M
Cyber Security Engineer
X-XSS-Protection
19 Jun 2022
X-XSS-Protection header invalid
Prathap
Co-founder, Director
SSL
19 Jun 2022
Renegotiation allowing to insert data into HTTPS sessions
Prathap
Co-founder, Director
SSL
19 Jun 2022
Lucky Thirteen attack against implementations of the Transport Laye...
Jijith Rajan
Cyber Security Engineer
HSTS
19 Jun 2022
HTTP Strict Transport Security (HSTS) header on the invalid certifi...
Prathap
Co-founder, Director
CORS
19 Jun 2022
Cross-Origin Resource Sharing implemented with universal access
Prathap
Co-founder, Director
Content Security Policy
19 Jun 2022
Content Security Policy implemented with unsafe inline
Prathap
Co-founder, Director
Content Security Policy
19 Jun 2022
Content Security Policy (CSP) implemented with insecure scheme
Nash N Sulthan
Cyber Security Lead Engineer
Content Security Policy
19 Jun 2022
Content Security Policy (CSP) header cannot be parsed successfully
Manieendar Mohan
Cyber Security Lead Engineer
Data Security
16 Jun 2022
8 Login Tips to Stay Safe Online
Jessica Bullet
Content Writer at Software Tested
Code Execution
08 Jun 2022
Spring4Shell Vulnerability: Analysis and Mitigation
Manieendar Mohan
Cyber Security Lead Engineer
Client Side URL Redirect
HSTS
05 Jun 2022
Redirection from HTTP to HTTPS to a different host preventing HSTS
Nash N Sulthan
Cyber Security Lead Engineer
Client Side URL Redirect
HSTS
05 Jun 2022
Redirection from HTTP to HTTPS to a different host preventing HSTS
Nash N Sulthan
Cyber Security Lead Engineer
web security
26 May 2022
A Comprehensive Guide to Web Application Security
Jason Parms
Customer Service Manager at SSL2BUY
AI
08 May 2022
Two-factor authentication: How Beagle Security handles 2FA security...
Nasim Sulaiman
AI Engineer
SQL Injection
04 May 2022
SQL injection(SQLi)
Manieendar Mohan
Cyber Security Lead Engineer
Webinar
19 Apr 2022
State of Application Security in the IT Sector
Manieendar Mohan
Cyber Security Lead Engineer
metadata
19 Apr 2022
Website contains Mercurial metadata directory
Manieendar Mohan
Cyber Security Lead Engineer
metadata
19 Apr 2022
Sub resource Integrity (SRI) not implemented but all external scrip...
Febna V M
Cyber Security Engineer
SSL
19 Apr 2022
Logjam attack against the TLS protocol
Prathap
Co-founder, Director
SSL
19 Apr 2022
Factoring RSA Export Keys (FREAK) Attack
Jijith Rajan
Cyber Security Engineer
web security
13 Apr 2022
Cyber Security Threats and Best Practices for Remote Workers
Manieendar Mohan
Cyber Security Lead Engineer
Web server
04 Apr 2022
Fingerprinting Web Server
Prathap
Co-founder, Director
owasp
24 Mar 2022
Sensitive Data Exposure OWASP 2013
Nash N Sulthan
Cyber Security Lead Engineer
Press
10 Feb 2022
Beagle Security listed among G2’s Best Security Products 2022
web security
08 Feb 2022
What is ModSecurity? Installation Guide for Apache on Ubuntu
Sooraj V Nair
Cyber Security Engineer
Press
08 Jan 2022
Beagle Security named a Leader in G2's Winter 2022 Report
web security
07 Jan 2022
Why Automate Web Application Security Testing?
Rejah Rehim
Co-founder, Director
owasp
29 Dec 2021
OWASP Top 10 2021
Deepraj R
Content Specialist
Cookies
22 Nov 2021
Cookie Theft: Phishing Campaign Targets YouTube Creators
Meera Mathews
Software Engineer
DOMECTF2021
22 Nov 2021
DomeCTF 2021
Deepraj R
Content Specialist
DOMECTF2021
20 Nov 2021
The Spy Write-up
Nash N Sulthan
Cyber Security Lead Engineer
DOMECTF2021
20 Nov 2021
SEO Write-up
Nash N Sulthan
Cyber Security Lead Engineer
DOMECTF2021
20 Nov 2021
Rocket Write-up
Anees P K
DevSecOps Engineer
DOMECTF2021
20 Nov 2021
Murder Write-up
Nasim Sulaiman
AI Engineer
DOMECTF2021
20 Nov 2021
JOT Write-up
Gincy Mol A G
AI Engineer
DOMECTF2021
20 Nov 2021
International Space Station Write-up
Manieendar Mohan
Cyber Security Lead Engineer
DOMECTF2021
20 Nov 2021
Farness Write-up
Nasim Sulaiman
AI Engineer
DOMECTF2021
20 Nov 2021
LockBox Write-up
Febna V M
Cyber Security Engineer
Code Execution
18 Oct 2021
Apache HTTP Server Path Traversal and Remote Code Execution
Jijith Rajan
Cyber Security Engineer
Code Execution
13 Oct 2021
Microsoft MSHTML Remote Code Execution Vulnerability
Sooraj V Nair
Cyber Security Engineer
SSL
14 Jul 2021
POODLE Attack
Febna V M
Cyber Security Engineer
Bypass
09 Jun 2021
HTTP Request Smuggling
Rejah Rehim
Co-founder, Director
Htaccess
30 Apr 2021
Htaccess Bypass
Nash N Sulthan
Cyber Security Lead Engineer
Content Security Policy
20 Apr 2021
Content Security Policy (CSP): Use Cases and Examples
Manieendar Mohan
Cyber Security Lead Engineer
Code Execution
08 Apr 2021
Remote Code Execution (RCE)
Rejah Rehim
Co-founder, Director
web security
10 Feb 2021
Building Application Security in the Azure DevOps Pipeline
Abey Koshy Itty
Marketing Manager
web security
29 Jan 2021
How to Improve Web Application Security?
Sooraj V Nair
Cyber Security Engineer
AI
20 Jan 2021
How AI is Transforming Cyber Security
Nasim Sulaiman
AI Engineer
Data Security
10 Jan 2021
Here's What You Need to Know About WhatsApp's New Privacy Policy
Abey Koshy Itty
Marketing Manager
web security
29 Dec 2020
Session Security
Gincy Mol A G
AI Engineer
Injection
15 Dec 2020
Server Side Request Forgery Attack
Sanjana Sanjeeva Shetty
Security Engineer
Cyber attacks
03 Dec 2020
Man-in-the-Middle (MITM) Attack: Types, Techniques and Prevention
Febna V M
Cyber Security Engineer
Cyber attacks
23 Nov 2020
How to Respond to a Cyber Attack?
Abey Koshy Itty
Marketing Manager
Web server
13 Nov 2020
Nginx Server Security: Nginx Hardening Guide
Manieendar Mohan
Cyber Security Lead Engineer
CMS Security
05 Nov 2020
CMS Vulnerabilities: Why are CMS platforms common hacking targets?
Sooraj V Nair
Cyber Security Engineer
Container security
29 Oct 2020
Docker Container Security: Attacking Docker Vulnerabilities
Sanjana Sanjeeva Shetty
Security Engineer
WordPress
19 Oct 2020
10 Common WordPress Errors That Should be Fixed
Loveneet Singh
Director of Product Marketing,
WP Hacked Help
AI
09 Oct 2020
Machine Learning for Web Automation
Nasim Sulaiman
AI Engineer
DOMECTF2020
21 Sep 2020
c0c0n XIII: DOME CTF 2020
Abey Koshy Itty
Marketing Manager
DOMECTF2020
20 Sep 2020
Hike to the Top Writeup
Ananthu S
Lead Engineer
DOMECTF2020
20 Sep 2020
TPM Writeup
Sooraj V Nair
Cyber Security Engineer
DOMECTF2020
20 Sep 2020
Time Zone Writeup
Anees P K
DevSecOps Engineer
DOMECTF2020
20 Sep 2020
Tiktok Writeup
Nash N Sulthan
Cyber Security Lead Engineer
DOMECTF2020
20 Sep 2020
The Retrospect Writeup
Nasim Sulaiman
AI Engineer
DOMECTF2020
20 Sep 2020
The Leaked List Writeup
Manieendar Mohan
Cyber Security Lead Engineer
DOMECTF2020
20 Sep 2020
Stones Writeup
Febna V M
Cyber Security Engineer
DOMECTF2020
20 Sep 2020
Qropolis Writeup
Anandhu K A
Lead Engineer
DOMECTF2020
20 Sep 2020
PetVet Writeup
Anees P K
DevSecOps Engineer
DOMECTF2020
20 Sep 2020
Neos Writeup
Anandhu Krishnan
Lead Engineer
DOMECTF2020
20 Sep 2020
Mercure’s Signature Dish Writeup
Jishnu Vijayan
Security Engineer
DOMECTF2020
20 Sep 2020
JimmyBot Writeup
Manieendar Mohan
Cyber Security Lead Engineer
DOMECTF2020
20 Sep 2020
Inside Out Writeup
Anandhu K A
Lead Engineer
DOMECTF2020
20 Sep 2020
Foundation Palette Writeup
Gincy Mol A G
AI Engineer
DOMECTF2020
20 Sep 2020
City Writeup
Manieendar Mohan
Cyber Security Lead Engineer
DOMECTF2020
20 Sep 2020
Black Propagation Writeup
Nasim Sulaiman
AI Engineer
DOMECTF2020
20 Sep 2020
Assemble Writeup
Gincy Mol A G
AI Engineer
DOMECTF2020
20 Sep 2020
Adleman's Doc Writeup
Febna V M
Cyber Security Engineer
DOMECTF2020
20 Sep 2020
The Dark Times Writeup
Nash N Sulthan
Cyber Security Lead Engineer
DOMECTF2020
20 Sep 2020
Frames & Stories Writeup
Gincy Mol A G
AI Engineer
Data Security
16 Sep 2020
5 Biggest Data Breaches of 2020
Abey Koshy Itty
Marketing Manager
web security
07 Sep 2020
How to Store and Secure Sensitive Data in Web Applications
Gincy Mol A G
AI Engineer
web security
25 Aug 2020
Secure Firewall Configuration for Web Applications
Febna V M
Cyber Security Engineer
WordPress
21 Jul 2020
WordPress Security: Vulnerabilities and How to Improve Security
Manieendar Mohan
Cyber Security Lead Engineer
Information Leakage
15 Jul 2020
SIGRed: Microsoft DNS Server RCE Vulnerability
Sooraj V Nair
Cyber Security Engineer
Information Leakage
14 Jul 2020
DNS Zone Transfer Vulnerability
Febna V M
Cyber Security Engineer
Web server
06 Jul 2020
Importance of TLS 1.3: SSL and TLS Vulnerabilities
Gincy Mol A G
AI Engineer
Web server
27 Jun 2020
Hardening Server Security By Implementing Security Headers
Manieendar Mohan
Cyber Security Lead Engineer
Web server
15 Jun 2020
Apache Web Server Hardening
Anees P K
DevSecOps Engineer
AI
web security
26 May 2020
Artificial Intelligence in Cyber Security
Febna V M
Cyber Security Engineer
AI
web security
26 May 2020
Artificial Intelligence in Cyber Security
Febna V M
Cyber Security Engineer
Cyber attacks
23 Apr 2020
Covid-19 Cyber Attacks: How Attackers are Exploiting the Crisis
Abey Koshy Itty
Marketing Manager
web security
SMB
05 Jan 2020
Why Small Businesses Should Invest in Cybersecurity?
Abey Koshy Itty
Marketing Manager
web security
SMB
05 Jan 2020
Why Small Businesses Should Invest in Cybersecurity?
Abey Koshy Itty
Marketing Manager
web security
SMB
01 Jan 2020
5 Ways to Improve Your Web Application Security in 2020
Abey Koshy Itty
Marketing Manager
web security
SMB
01 Jan 2020
5 Ways to Improve Your Web Application Security in 2020
Abey Koshy Itty
Marketing Manager
Client Side URL Redirect
HSTS
06 Nov 2019
Alexa, Google Home and Siri Can Be Hacked Using Laser Light
Anees P K
DevSecOps Engineer
Client Side URL Redirect
HSTS
06 Nov 2019
Alexa, Google Home and Siri Can Be Hacked Using Laser Light
Anees P K
DevSecOps Engineer
blog
14 Oct 2019
High Severity Flaws Discovered in Nvidia Shield TV and Intel NUCs
Anandhu Krishnan
Lead Engineer
blog
12 Oct 2019
Critical RCE Vulnerability Found in iTerm2 MacOS Terminal Emulator App
Nash N Sulthan
Cyber Security Lead Engineer
WordPress
04 Jul 2018
WordPress Versions
Manieendar Mohan
Cyber Security Lead Engineer
WordPress
04 Jul 2018
WordPress Themes
Jijith Rajan
Cyber Security Engineer
WordPress
04 Jul 2018
WordPress Plugin Vulnerabilities
Sooraj V Nair
Cyber Security Engineer
SQL Injection
04 Jul 2018
Union Query SQL Injection (SQLi)
Febna V M
Cyber Security Engineer
TLS
04 Jul 2018
Transport Layer Security
Prathap
Co-founder, Director
WordPress
04 Jul 2018
The unseen Drupal
Nash N Sulthan
Cyber Security Lead Engineer
TLS
04 Jul 2018
TLS(Transport Layer Security) protocol version outdated
Rejah Rehim
Co-founder, Director
SQL Injection
04 Jul 2018
Stacked Queries SQL Injection (SQLi)
Manieendar Mohan
Cyber Security Lead Engineer
SSL
04 Jul 2018
SSL(Secure Sockets Layer) protocol version outdated
Febna V M
Cyber Security Engineer
SQL Injection
04 Jul 2018
Inline Queries SQL Injection (SQLi)
Manieendar Mohan
Cyber Security Lead Engineer
SQL Injection
04 Jul 2018
Error based SQL Injection (SQLi)
Manieendar Mohan
Cyber Security Lead Engineer
Cookies Attributes
04 Jul 2018
Cookie session without 'Secure' flag
Prathap
Co-founder, Director
SQL Injection
04 Jul 2018
Boolean based Blind SQL Injection (SQLi)
Manieendar Mohan
Cyber Security Lead Engineer
owasp
04 Jul 2018
OWASP top ten 2013
blog
04 Jul 2018
Application Threat Modeling
Manieendar Mohan
Cyber Security Lead Engineer
XML Injection
29 Jun 2018
XML EXternal Entity injection
Nash N Sulthan
Cyber Security Lead Engineer
SQL Injection
29 Jun 2018
WordPress SQL Injection
Febna V M
Cyber Security Engineer
Blind SQL Injection
29 Jun 2018
WordPress Blind SQL Injection
Febna V M
Cyber Security Engineer
DOM XSS
29 Jun 2018
Document Object Model Based Cross Site Scripting
Manieendar Mohan
Cyber Security Lead Engineer
Directory traversal
26 Jun 2018
WordPress Directory traversal
Sooraj V Nair
Cyber Security Engineer
XSS
26 Jun 2018
WordPress Cross-Site Scripting
Prathap
Co-founder, Director
owasp
24 Jun 2018
Using Components with Known Vulnerabilities
Rejah Rehim
Co-founder, Director
owasp
24 Jun 2018
Unvalidated Redirects and Forwards
Rejah Rehim
Co-founder, Director
Cookies
24 Jun 2018
Unsecured HTTP cookies
Rejah Rehim
Co-founder, Director
owasp
24 Jun 2018
Sensitive Data Exposure
Nash N Sulthan
Cyber Security Lead Engineer
Injection
24 Jun 2018
Remote OS Command Injection
Nash N Sulthan
Cyber Security Lead Engineer
Injection
24 Jun 2018
MX injection
Febna V M
Cyber Security Engineer
Injection
24 Jun 2018
Lightweight Directory Access Protocol (LDAP) injection
Febna V M
Cyber Security Engineer
Clickjacking
24 Jun 2018
Lack of wildcard DNS entry found
Febna V M
Cyber Security Engineer
owasp
24 Jun 2018
Insufficient Logging And Monitoring
Febna V M
Cyber Security Engineer
owasp
24 Jun 2018
Insecure Direct Object References
Febna V M
Cyber Security Engineer
owasp
24 Jun 2018
Insecure Deserialization
Manieendar Mohan
Cyber Security Lead Engineer
XSS
24 Jun 2018
Cross Site Scripting
Prathap
Co-founder, Director
owasp
24 Jun 2018
Broken Authentication
Manieendar Mohan
Cyber Security Lead Engineer
X-XSS-Protection
19 Jun 2018
X-XSS-Protection Not Implemented
Sooraj V Nair
Cyber Security Engineer
metadata
19 Jun 2018
Website contains SVN metadata directory
Nash N Sulthan
Cyber Security Lead Engineer
metadata
19 Jun 2018
Website contains Git metadata directory
Febna V M
Cyber Security Engineer
Injection
CRLF
19 Jun 2018
Web based mail package
Manieendar Mohan
Cyber Security Lead Engineer
Injection
CRLF
19 Jun 2018
Web based mail package
Manieendar Mohan
Cyber Security Lead Engineer
SSL
19 Jun 2018
Tickets option leak uninitialised memory
Jijith Rajan
Cyber Security Engineer
SSL
19 Jun 2018
The RC4 algorithm In Transport Layer Security and Secure Sockets Layer
Sooraj V Nair
Cyber Security Engineer
SRI
19 Jun 2018
Subresource Integrity (SRI) implemented, but external scripts are l...
Nash N Sulthan
Cyber Security Lead Engineer
SRI
19 Jun 2018
Subresource Integrity (SRI) is not implemented, and external script...
Manieendar Mohan
Cyber Security Lead Engineer
status code
19 Jun 2018
Site did not return a status code of 200
Jijith Rajan
Cyber Security Engineer
HSTS
Cookies Attributes
19 Jun 2018
Session Cookie set without 'Secure' Flag but protected by HSTS
Sooraj V Nair
Cyber Security Engineer
HSTS
Cookies Attributes
19 Jun 2018
Session Cookie set without 'Secure' Flag but protected by HSTS
Sooraj V Nair
Cyber Security Engineer
SSL
19 Jun 2018
SWEET32 attack
Rejah Rehim
Co-founder, Director
SSL
19 Jun 2018
Processing of Change Cipher Spec
Nash N Sulthan
Cyber Security Lead Engineer
SSL
19 Jun 2018
Obtain plaintext by observing length differences
Manieendar Mohan
Cyber Security Lead Engineer
SSL
19 Jun 2018
Logjam common primes
Sooraj V Nair
Cyber Security Engineer
Information Leakage
19 Jun 2018
Information leakage in EXIF data of images
Rejah Rehim
Co-founder, Director
SSL
19 Jun 2018
Heartbleed vulnerability
Nash N Sulthan
Cyber Security Lead Engineer
HSTS
19 Jun 2018
HTTP Strict Transport Security (HSTS) header not implemented
Manieendar Mohan
Cyber Security Lead Engineer
HSTS
19 Jun 2018
HTTP Strict Transport Security header not available over HTTPS
Jijith Rajan
Cyber Security Engineer
HSTS
19 Jun 2018
HTTP Strict Transport Security (HSTS) header cannot be recognised
Sooraj V Nair
Cyber Security Engineer
CORS
19 Jun 2018
Cross-Origin Resource Sharing XML cannot be parsed
Sooraj V Nair
Cyber Security Engineer
Cookies Attributes
19 Jun 2018
Cookies SameSite flag invalid
Nash N Sulthan
Cyber Security Lead Engineer
HSTS
19 Jun 2018
Cookie without 'Secure' flag but protect by HSTS
Febna V M
Cyber Security Engineer
Cookies Attributes
19 Jun 2018
Cookie set without 'Secure' flag
Manieendar Mohan
Cyber Security Lead Engineer
CSRF
Cookies Attributes
19 Jun 2018
Cookie anti-CSRF flag without SameSite flag
Sooraj V Nair
Cyber Security Engineer
CSRF
Cookies Attributes
19 Jun 2018
Cookie anti-CSRF flag without SameSite flag
Sooraj V Nair
Cyber Security Engineer
Content Security Policy
19 Jun 2018
Content Security Policy (CSP) header not implemented
Febna V M
Cyber Security Engineer
Injection
CRLF
19 Jun 2018
CRLF Injection
Rejah Rehim
Co-founder, Director
Injection
CRLF
19 Jun 2018
CRLF Injection
Rejah Rehim
Co-founder, Director
SSL
19 Jun 2018
Browser Exploit Against SSL/TLS
Sooraj V Nair
Cyber Security Engineer
SQL Injection
Time Based Blind SQL Injection
05 Jun 2018
Time based Blind SQL Injection (SQLi)
Manieendar Mohan
Cyber Security Lead Engineer
SQL Injection
Time Based Blind SQL Injection
05 Jun 2018
Time based Blind SQL Injection (SQLi)
Manieendar Mohan
Cyber Security Lead Engineer
IBM
SQL Injection
Injection
05 Jun 2018
IBM DB Boolean based blind sql injection
Nash N Sulthan
Cyber Security Lead Engineer
IBM
SQL Injection
Injection
05 Jun 2018
IBM DB Boolean based blind sql injection
Nash N Sulthan
Cyber Security Lead Engineer
IBM
SQL Injection
Injection
05 Jun 2018
IBM DB Boolean based blind sql injection
Nash N Sulthan
Cyber Security Lead Engineer
Cookies Attributes
05 Jun 2018
Cookie session without 'HttpOnly' flag
Jijith Rajan
Cyber Security Engineer
Client Side URL Redirect
05 Jun 2018
Redirects to HTTPS eventually, but initial redirection is to anothe...
Prathap
Co-founder, Director
Client Side URL Redirect
05 Jun 2018
Redirects, but final destination is not an HTTPS URL.
Rejah Rehim
Co-founder, Director
Client Side URL Redirect
05 Jun 2018
Invalid certificate chain encountered during redirection
Febna V M
Cyber Security Engineer
Client Side URL Redirect
05 Jun 2018
Does not redirect to a HTTPS site from HTTP port
Manieendar Mohan
Cyber Security Lead Engineer
Experience the power of automated penetration testing & contextual reporting.
Sign up free
Product tour