Remote File Inclusion (RFI)

Remote file inclusion (RFI) is an attack that targets vulnerabilities present in web applications that dynamically reference external scripts. The offender aims at exploiting the referencing function in an application in order to upload malware from a remote URL located in a different domain. Successful RFI attacks lead to compromised servers, information theft, and a site […]

Vulnerability Assessment

What is a Vulnerability Assessment? Vulnerability assessment refers to a testing process used for detecting and assigning severity levels to a number of security defects within a specific time period. This assessment process could involve manual and automated techniques with different degrees of consistency and an emphasis on comprehensive coverage. With the help of a risk-based […]

What is Network Firewall Security and how works

Network Firewall: Definition A network firewall shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination of the two. Network firewalls are responsible for protecting an internal computer network against malicious access from the outside, such as vulnerable open network ports or malware-infested websites. Network firewalls can be […]

Do you know what is a Web Application Firewall?

The Web Application Firewall (WAF) protects online services from malicious internet traffic. Basically, the function of WAF is to detect malicious traffic to filter out threats which may bring havoc for the online applications. Thereby, it examines HTTP traffic before it reaches the application server. Besides, it offers protection against the unauthorized transfer of data from the […]