In the previous part, we have mentioned to threats from Input Validation, Man-In-Middle, Session Management, Error Handling [...]Read more To Build Your Code Quality (Chapter A): Secure Coding (Part 2)
From the roots of issues Code quality’s always a matter of software engineering. It’s hard to measure the level of code quality and even to [...]Read more To Build Your Code Quality (Chapter A): Secure Coding (Part 1)
July 24, 2018
What is Risk-based testing Risk-based testing (RBT) is a type of software testing that functions as an organizational principle used to [...]Read more [Mindmap] Risk-based Testing Overview by MeU Solutions
July 12, 2018
Insecure Direct Object References (IDOR) is referenced in element A4 of OWASP top 10 in 2013 edition. It’s no longer in top ten as an individual [...]Read more [Video] OWASP – Insecure Direct Object References – Have you known it intimately?
June 16, 2018
A successful CSRF attack can be devastating for both the business and user. It can result in damaged client relationships, unauthorized fund [...]Read more [Video] CSRF (Cross Site Request Forgery) Attacks tutorial & Exploit CSRF in DVWA (Low, High Level)
June 1, 2018
Watch this video tutorial -- a video from MEU SOLUTIONS, if you want to learn about XSS (Cross Site Scripting) exploit, It's more dangerous than [...]Read more [Video] XSS – Cross Site Scripting – More dangerous than you think!
April 9, 2018
Penetration tester team at MeU [...]Read more [Video] OWASP Top 10 series (Part 1): SQL Injection exploitation- step by step
March 1, 2018
Open Web Application Security Project (OWASP) is an organization filled with security experts from around the world who provide information about [...]Read more OWASP Top 10 Application Security Risks – 2017