What Is Scraping?

What Is Scraping

Scraping is a common OWASP-identified automated threat, used by attackers to automate the collection of data from websites. It involves using automated tools to extract information from web pages, which can be used for a variety of purposes, such as stealing user data, analyzing website structure, or creating fake accounts. In this post, we will […]

What Is Footprinting?

What Is Footprinting

Footprinting is a type of OWASP-identified automated attack that involves gathering information about a target system or network to identify vulnerabilities and plan future attacks. Attackers use a variety of techniques to collect information, such as social engineering, dumpster diving, and online research. In this blog, we will discuss the methods used by attackers, the […]

What Is Fingerprinting? How To Protect Against Fingerprinting Attacks?

What Is Fingerprinting

Fingerprinting is a type of OWASP automated threat that is used to identify information about a target system or network. Attackers use various techniques to collect information about the target, such as the operating system, software versions, and other system characteristics. In this blog, we will go through fingerprinting attacks, the methods used by attackers, […]

What Is OAT-006 Expediting Attacks?

What Is OAT-006 Expediting Attacks

Expediting attacks, also known as “rush attacks”, are a type of OWASP automated threat that targets a business’s system or website with a high volume of traffic or requests in a short period of time. These attacks can result in a system overload, causing it to crash or become unresponsive. In this article, we will […]

CVE-2023-22018 : ORACLE VM VIRTUALBOX CORE REMOTE CODE EXECUTION

CVE-2023-22018 : ORACLE VM VIRTUALBOX CORE REMOTE CODE EXECUTION

Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.46 and Prior to 7.0.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via RDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM […]