by TCMS Staff | Jan 29, 2025 | Web Applications
Every four years, the Open Web Application Security Project (OWASP) publishes a top ten list of the most critical security risks that web applications are prone to. This list was last published in 2021, marking 2025 as the year for an update. OWASP utilizes a plethora...
by Alex Olsen | Dec 18, 2024 | Web Applications
What is Prototype Pollution? Prototype pollution is a critical vulnerability that affects JavaScript applications by allowing an attacker to manipulate the prototype of JavaScript objects, often leading to unexpected and dangerous behaviors throughout the application....
by Alex Olsen | Nov 6, 2024 | Web Applications
Today we will delve into the key concepts and principles of application security, providing a comprehensive overview for developers, IT professionals, and business leaders alike. Application security is a fundamental aspect of software development that can make or...
by TCMS Staff | Jul 19, 2024 | Web Applications
0. Overview Web applications actively facilitate business operations, allowing businesses to interact with customers, streamline processes, and deliver crucial services over the internet. Cyber attackers often focus on these applications because of their online...
by Alex Olsen | Jul 10, 2024 | Web Applications
Introduction The new Practical Web Pentest Professional (PWPP) certification is now available! In this article, we’ll talk about how to prepare for the exam. You won’t find any spoilers, but you will find some helpful tips for how best to prepare for and approach the...
by TCMS Staff | Mar 25, 2024 | Programming, Web Applications
Overview In the third part of our series on creating extensions for Burp Suite using the Montoya API, we will learn about design patterns and implement a Singleton object. Additionally, we’ll ensure our custom header only gets added to in-scope requests. If you...