Injection Flaws

15/03/2024 Andre' du Toit 0

Injection flaws occur when untrusted data is transmitted to an interpreter (SQL Parser, language runtime etc.) as part of a command or query. Attackers exploit […]

SQL Injection

04/03/2024 Andre' du Toit 0

SQL injection remains a persistent threat to web applications. This article delves into the mechanics of SQL injection attacks, explores their potential impact, and provides […]

DarkHotel

13/05/2019 Andre' du Toit 0

The Dark Hotel cyber threat first emerged on the radar in the mid-2000s, introducing a new era of targeted cyber-espionage. Operating with a level of […]

The Mirai Botnet

02/12/2018 Andre' du Toit 0

Emerging in 2016, Mirai’s primary objective is the compromising and control of a multitude of IoT devices, leveraging their combined computing power for large-scale Distributed […]

The OWASP Top 10

28/11/2018 Andre' du Toit 0

The non-profit Open Web Application Security Project (OWASP – https://www.owasp.org/) provides a list of 10 Risks to Web Application Security to guide architects, developers and […]

The ACSC Essential Eight

20/11/2018 Andre' du Toit 0

Australia’s Cyber Security Centre (ACSC – https://www.acsc.gov.au/) provides a list of eight mitigation strategies (the Essential Eight) with practical guidelines for organisations to follow in […]