It is challenging to keep up with the number and prevalence of vulnerabilities. Many frequently download third-party components that contain critical vulnerabilities, which can lead to serious exploits and attacks.
The Path Traversal attack technique (also known as Directory Transversal) allows an attacker to access files, directories, and commands that reside outside the root directory.
Cross-site scripting (XSS) is one of the most common web vulnerabilities that can lead to phishing attacks, website defacement, session hijacking, and installation of malware on a victim’s computer.
SQL injection attacks enable attackers to tamper with, delete or steal sensitive data from corporate databases. We will discuss SQL injection attacks and how to best defend against them.
Join us to understand what happens when someone logs into a web application. Mike King, Technical Escalations Engineer for WhiteHat Security, will guide you through common access scenarios and vulnerabilities.
Mobile app development has become an assembly game where almost anyone can build an app. Thanks to low and no code tools like AppMakr and Appypie and cross-platform tools like XAMARIN and PhoneGap, few to no app dev skills are required. For more sophisticated apps built by mobile developers using native languages like Java and SWIFT, often more than half of the code comes from internal component reuse and free or licensed third-party libraries.
This year WhiteHat has partnered with strategic partners Coalfire and NowSecure on the 2018 Application Security Statistics Report and analyzed data from more than 20,000 applications to provide a true state of application security report.
Traditional software development processes involve relatively large teams working on a single, monolithic deployment artifact. A microservices architecture, on the other hand, provides a different approach to software development.
Successfully pivot your security program to achieve PCI DSS compliance and minimize risk without sacrificing organizational agility.
In this on-demand webinar, learn best practices of mobile security, steps to implement DevSecOps for mobile, and 2 case studies of mobile DevSecOps.
Watch this on-demand webinar to learn the right BLA methodology to uncover hidden and persistent vulnerabilities.
The Twelve Factor App captured a methodology that developers can apply to build SAAS apps that are both scalable and maintainable in a DevOps world.