Application attacks and vulnerabilities
Web application attacks are malicious activities that target vulnerabilities in design and implementation, that may lead to unauthorized access and data theft.
- What is Remote Code Execution (RCE)
Learn what remote code execution (RCE) is, how RCE attacks work, why they’re dangerous, how to prevent them using WAFs, and how Fastly can help.
- What is Vulnerability Scanning?
Learn what vulnerability scanning is, why it matters, how it works, and best practices for reducing risk across networks, applications, APIs, cloud, and hosts
- What is OS command injection?
OS command injection is a web application vulnerability that allows attackers to execute arbitrary commands on the underlying operating system.
- Qu’est-ce que la traversée de répertoires ?
Directory traversal, also known as “path traversal” (and identified with CWE-22), is a web application vulnerability that enables attackers to access unintended files on an underlying filesystem.
- Qu’est-ce qu’un pare-feu cloud ?
A cloud firewall acts as a virtual shield, protecting the digital boundaries of your cloud infrastructure from unauthorized access and cyberattacks.
- Qu’est-ce que l’authentification unique (SSO) ?
Single Sign-On (SSO) is an authentication method that enables users to access multiple applications or services using a single set of credentials managed by a trusted provider.
- Qu'est-ce qu'une passerelle Web sécurisée ?
Une passerelle web sécurisée (SWG) est une solution de cybersécurité qui sert de passerelle entre le réseau privé d'une organisation et le reste d'Internet.
- Qu’est-ce qu’un fournisseur d’identité (IdP) ?
An IdP Identity Provider is a service that creates, maintains, and manages users' identity information while providing authentication to your dependent systems.
- What is a DNS amplification attack?
A DNS amplification attack is a reflection-based DDoS attack that uses open DNS resolvers to flood targets with amplified UDP traffic.
- Qu’est-ce que le protocole RDP ?
Le Remote Desktop Protocol (RDP) est un protocole informatique développé par Microsoft qui permet aux utilisateurs de se connecter à un autre ordinateur et de l’utiliser à distance.
- What are credential stuffing attacks?
Credential stuffing is a type of cyberattack where stolen usernames and passwords are used to gain unauthorized access to multiple websites.
- Qu’est-ce qu’une attaque par force brute ?
A brute force attack is a cyberattack where a hacker uses software to systematically test different password combinations to gain access to an account without authorization.