Remove tag web-security
article thumbnail

How to make your web application more secure by using Dynamic Application Security Testing (DAST) – PART 2 of Application Security Testing series

Xebia

Introduction Welcome to part two of the Application Security Testing series. Like I mentioned in the previous blog, during this blog series we are going to look at the different types of Application Security Testing and Software Composition Analysis. DAST tests the security of an application by scanning it at runtime.

article thumbnail

How to make your web application more secure by using Interactive Application Security Testing (IAST) – PART 3 of Application Security Testing series

Xebia

Introduction Welcome to part three of the blog series about Application Security Testing. In part one of this series, we looked at Static Application Security Testing (SAST) and in part two at Dynamic Application Security Testing (DAST). First a brief explanation is given about IAST. This is done via an agent.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

6 Blogging Strategies to Promote Your Business

KitelyTech

Any business can benefit from a blog, but it takes the right strategy to get results. A great way to create an online presence for your business is through blogging. Unfortunately, many businesses end up abandoning their blogs altogether when they don’t receive the web traffic they expected. Identify Your Purpose.

article thumbnail

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform: Complete Visibility with Asset Inventory and Discovery

Tenable

Visibility serves as the cornerstone of security, offering organizations the means to monitor, analyze, and safeguard their digital infrastructure effectively. Moreover, real-time visibility enables security teams to proactively mitigate threats before they can escalate into a full-blown crisis.

IoT 70
article thumbnail

CVE-2021-44228: Proof-of-Concept for Critical Apache Log4j Remote Code Execution Vulnerability Available (Log4Shell)

Tenable

Secure LDAP (LDAPS). Query our API for "tags=CVE-2021-44228" for source IP addresses and other IOCs. At the time this blog post was published, there were an additional several PoCs available on GitHub. Once the scan templates are available, we will update this blog post. Hide From Blog. Blog Section.

article thumbnail

Frequently Asked Questions for CitrixBleed (CVE-2023-4966)

Tenable

Background The Tenable Security Response Team has put together this blog to answer frequently Asked Questions (FAQ) regarding a critical vulnerability known as CitrixBleed. A logo for CitrixBleed was created by security researcher Kevin Beaumont. High We published a blog post for both vulnerabilities on October 18.

article thumbnail

Applet in Java

InnovationM

Java applets are small programs that run on a web browser to perform a specific task. They were introduced with the release of the first version of Java in 1995 and quickly became popular for their ability to add dynamic content to web pages. What are Applets? How do Applets work? There is no main() method in any Applet class.

Windows 97