data breach search engine

The Data Breach Investigation and Mitigation Checklist

In this blog, we provide you with the data breach investigation and mitigation checklist necessary to avoid mishaps when dealing…

3 years ago

Protecting Applications From RCE with a Single Function: a Cheat Sheet

In this blog post, we provide you with a cheat sheet to quickly protect your web applications from Remote Code…

3 years ago

MyISAM vs. InnoDB: The Problem

In this blog post, we tell you how does MyISAM compare with InnoDB.

3 years ago

What is SSRF?

In this blog post, we tell you what SSRF is, how it works, and how best to protect against the…

3 years ago

How to Protect Against CSRF?

In this blog post, we tell you how best to protect your web applications against CSRF attacks.

3 years ago

The TikTok & weChat Data Breaches: What’s Known?

In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…

3 years ago

Protecting Web Applications from Remote Code Execution (RCE): a Short Guide

In this blog, we explain how best to protect your web applications from Remote Code Execution attacks.

3 years ago

How to Protect Yourself From Phishing Attacks?

In this blog post, we tell you how best to protect yourself from phishing attacks and walk you through a…

3 years ago

MySQL Security Best Practices: A Checklist

Walk yourself through MySQL security best practices.

3 years ago