cyberaty

Ajax Hacking

Before moving towards the in depth detail of Ajax hijacking, let us discuss what is Ajax. WHAT IS AJAX AJAX stands for Asynchronous JavaScript and XML. Ajax is used to create fast, efficient and better web applications by using HTML, CSS, XML and JavaScript. It uses DOM and JavaScript for dynamic content display. When the …

Ajax Hacking Read More »

Penetration Testing Introduction

PENETRATION TESTING To evaluate a computer system’s security, a penetration test is a simulated attack authorized by the system’s owner. To find and demonstrate business impacts of system weaknesses, penetration testers use the same tools, techniques, and processes used by attackers. WHAT IS PENETRATION TESTING? During penetration testing, a variety of attacks are simulated to …

Penetration Testing Introduction Read More »

Adversarial Machine Learning Threat Matrix

Microsoft and MITRE , also 11 other organizations including IBM, NVIDAI released adversarial Machine Learning Threat Matrix, an industry-focused open framework, to empower security analysts to detect, respond to, and remediate threats against ML systems: https://github.com/mitre/advmlthreatmatrix Read more on how cyberattacks against machine learning systems are more common than you think: https://www.microsoft.com/security/blog/2020/10/22/cyberattacks-against-machine-learning-systems-are-more-common-than-you-think/