HTTP, we often hear this acronym; it enables the web to function, but how does it really work? Let's find out!
How can an attacker bypass a WAF or firewall and access information that is supposed to be protected?
Delve into the Dark Depths of SQL Injection: When Data Becomes Weapons
Let me vulgarize one of the most seen web vulnerability, Cross Site Scripting also known as XSS