Application attacks and vulnerabilities

Web application attacks are malicious activities that target vulnerabilities in design and implementation, that may lead to unauthorized access and data theft.

  • What is Vulnerability Scanning?

    Learn what vulnerability scanning is, why it matters, how it works, and best practices for reducing risk across networks, applications, APIs, cloud, and hosts

  • Was ist OS Command Injection?

    OS command injection is a web application vulnerability that allows attackers to execute arbitrary commands on the underlying operating system.

  • Was ist Directory Traversal?

    Directory traversal, also known as “path traversal” (and identified with CWE-22), is a web application vulnerability that enables attackers to access unintended files on an underlying filesystem.

  • Was ist eine Cloud-Firewall?

    A cloud firewall acts as a virtual shield, protecting the digital boundaries of your cloud infrastructure from unauthorized access and cyberattacks.

  • Was ist Single Sign-On (SSO)?

    Single Sign-On (SSO) is an authentication method that enables users to access multiple applications or services using a single set of credentials managed by a trusted provider.

  • Was ist ein Secure Web Gateway?

    Ein Secure Web Gateway (SWG) ist eine Cybersicherheitslösung, die als Schnittstelle zwischen dem privaten Netzwerk eines Unternehmens und dem Rest des Internets fungiert.

  • Was ist ein Identity Provider; Identitätsanbieter (IdP)?

    An IdP Identity Provider is a service that creates, maintains, and manages users' identity information while providing authentication to your dependent systems.

  • What is a DNS amplification attack?

    A DNS amplification attack is a reflection-based DDoS attack that uses open DNS resolvers to flood targets with amplified UDP traffic.

  • Was ist RDP?

    Remote Desktop Protocol (RDP) ist ein von Microsoft entwickelter Software-Standard, der es Nutzern ermöglicht, sich mit einem anderen Computer zu verbinden und diesen aus der Ferne zu nutzen.

  • What are credential stuffing attacks?

    Credential stuffing is a type of cyberattack where stolen usernames and passwords are used to gain unauthorized access to multiple websites.

  • Was ist ein Brute-Force-Angriff?

    A brute force attack is a cyberattack where a hacker uses software to systematically test different password combinations to gain access to an account without authorization.