The Data Breach Investigation and Mitigation Checklist

3 years ago

In this blog, we provide you with the data breach investigation and mitigation checklist necessary to avoid mishaps when dealing…

Protecting Applications From RCE with a Single Function: a Cheat Sheet

3 years ago

In this blog post, we provide you with a cheat sheet to quickly protect your web applications from Remote Code…

MyISAM vs. InnoDB: The Problem

3 years ago

In this blog post, we tell you how does MyISAM compare with InnoDB.

What is SSRF?

3 years ago

In this blog post, we tell you what SSRF is, how it works, and how best to protect against the…

How to Protect Against CSRF?

3 years ago

In this blog post, we tell you how best to protect your web applications against CSRF attacks.

The TikTok & weChat Data Breaches: What’s Known?

3 years ago

In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…

Protecting Web Applications from Remote Code Execution (RCE): a Short Guide

3 years ago

In this blog, we explain how best to protect your web applications from Remote Code Execution attacks.

How to Protect Yourself From Phishing Attacks?

3 years ago

In this blog post, we tell you how best to protect yourself from phishing attacks and walk you through a…

Choosing Character Sets in MySQL: A Short Guide

3 years ago

In this blog, we will look a little closer into the character sets available in MySQL – we will tell…

The MySQL Server – mysqld

3 years ago

In this blog, we discuss the ins and outs of the MySQL daemon and tell you how best to improve…