Aleph-Tav-Technologies_ApSec_Vulnerabilities_HTTPVerbTampering3

HTTP verb tampering is a serious threat, oft-ignored

Application Security Threat Research Series – Part 2: HTTP Verb Tampering Anybody with a flourishing business goes paranoid every now and then that a begrudging party might unleash an attack with the motive of bringing down the reputation of their brand. While it isn’t always easy to stop meddlers, many companies fail to pay attention […]

Fixing OWASP Top Tep Vulnerabilities - IDOR - Aleph Tav Technologies

Insecure Direct Object Reference (IDOR) – A Gaping Hole

Application Security Threat Research Series – Part 1: IDOR This is an aerial shot of sheep leaving a grazing field in complete accord through a narrow gate while it looks like there isn’t even a fence in the first place (or perhaps a frail one that would not hold for long). The sheep are c onditioned to […]

Aleph Tav Technologies Intrusion Detection and Threat Monitoring

Protect your web server from web application hacks

With a vulnerable web application, you are helping hackers by significantly reducing the time, cost and efforts needed to get into your corporate network. When Magento, the widely-preferred e-commerce CMS was hacked in mid-2015, many web stores did not realize that there was an ongoing attack until their bank statements showed up. The cyber-crime group behind […]

Rogue applications, Application Security Testing - Aleph Tav Technologies Pvt Ltd

Security Alert: Rogue Applications

Competitiveness in the mobile-based business environment is precariously balanced on originality and the protection of ideas from being duplicated, misused or mutilated. Mobile Applications happen to be both the intellectual property and the identity of a brand. This means they must be secured both from the purview of regulatory compliance and the threat of identity […]