The chance is coincidental, recently contacted an open source web security tool Owaspap, and it is straightforward. Simple and easy to operate, complete function, have a variety of plug-ins, and
When it comes to data leakage and leakage, companies tend to realize that these may have damage to their user groups. However, although unaffected companies analyze the situation to ensure
According to Verizon, “2020 Data Leak Survey Report” shows that more than 80% of data leaks are caused by hackers to use the stolen password or weak password. Password security
About asymmetric encryption, Xiao Wei has already chatted many times, this time we continue to explore more deeply. Modern, cryptography has become an important discipline, whether it is military or
About SQLANCER SQLANCER, is known as Synthesized Querylancer, which is an automated security test tool for database management system DBMS. This tool can help vast researchers easily identify logic vulnerabilities
1. Introduction to DLP DTR leak protection (DLP, Data Leakage (Loss) prevention, is a direct protection of data, different from previously managed data, full encryption or full-authorization access, data leak
about regexploit regexploit can help researchers find regular expressions vulnerable to regular expression denial of service attack (redos) many default regular expression parsers are complex and have many security problems.
As data leaks are increasingly generally and serious, companies need to take the right strategy to protect businesses. Entrepreneurship is difficult, and the business is striving to build business, once
Network security researchers have discovered a new futon software called RegretLocker last month, although its software package is simple, but can cause serious damage to virtual hard drives on Windows
About Weakpass Weakpass is a rule-based online dictionary generator that can help vast researchers create custom dictionaries based on the input word set. In the process of penetration test, we