A Practice for Building Your DevOps Delivery Pipeline
DevOps is more and more popular in this era. It can be seen as a combination between agile and lean to improve the software delivery. Searching for DevOps, it doesn’t lead us a unique result. A lot of [
[Video] OWASP – Insecure Direct Object References – Have you known it intimately?
Insecure Direct Object References (IDOR) is referenced in element A4 of OWASP top 10 in 2013 edition. It’s no longer in top ten as an individual but was merged into A5 – Broken Access Control in top 10 OWASP [
[Video] CSRF (Cross Site Request Forgery) Attacks tutorial & Exploit CSRF in DVWA (Low, High Level)
A successful CSRF attack can be devastating for both the business and user. It can result in damaged client relationships, unauthorized fund transfers changed passwords and data theft—including stolen [
[Video] XSS – Cross Site Scripting – More dangerous than you think!
Watch this video tutorial -- a video from MEU SOLUTIONS, if you want to learn about XSS (Cross Site Scripting) exploit, It's more dangerous than you think. You will also learn how to prevent this attack. Remember to Like, [
[Video] OWASP Top 10 series (Part 1): SQL Injection exploitation- step by step
Penetration tester team at MeU [
Global IoT security spending will reach $1.5 Billion in 2018
Internet of Things (IoT)-based attacks are already a reality. A recent CEB, now Gartner, the survey found that nearly 20 percent of organizations observed at least [
OWASP Top 10 Application Security Risks – 2017
Open Web Application Security Project (OWASP) is an organization filled with security experts from around the world who provide information about applications [