BreachDirectory

What is SSRF?

In this blog post, we tell you what SSRF is, how it works, and how best to protect against the…

2 years ago

How to Protect Against CSRF?

In this blog post, we tell you how best to protect your web applications against CSRF attacks.

2 years ago

The TikTok & weChat Data Breaches: What’s Known?

In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…

2 years ago

How to Protect Yourself From Phishing Attacks?

In this blog post, we tell you how best to protect yourself from phishing attacks and walk you through a…

2 years ago

Choosing Character Sets in MySQL: A Short Guide

In this blog, we will look a little closer into the character sets available in MySQL – we will tell…

2 years ago

The MySQL Server – mysqld

In this blog, we discuss the ins and outs of the MySQL daemon and tell you how best to improve…

2 years ago

The Requirements for a Web Application Firewall: What’s On the List?

In this blog, we go through some of the requirements that can make or break a web application firewall.

3 years ago