vulnerable web applications

Results 1 - 3 of 3Sort Results By: Published Date | Title | Company Name
Published By: Carbon Black     Published Date: Apr 27, 2020
A fileless attack (“memory-based” or “living-off-the-land,” for example) is one in which an attacker uses existing software, allowed applications and authorized protocols to carry out malicious activities. More and more attackers are moving away from traditional malware—in fact, 60% of today’s attacks involve fileless techniques. These attacks are capable of gaining control of computers without using traditional executable files as a first level of attack. With fileless attacks, an attacker is able to infiltrate, take control and carry out objectives by taking advantage of vulnerable software that a typical end user would leverage on a dayto-day basis (think web browsers or Office-suite applications). Attackers will also use the successful exploit to gain access to native operating system tools (like PowerShell and Windows Management Instrumentation – WMI) or other applications that grant the attacker a level of execution freedom. These native tools grant users exceptional access and
Tags : 
    
Carbon Black
Published By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : 
qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
    
Qualys
Published By: Qualys     Published Date: Nov 16, 2012
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management program.
Tags : 
web applications, web application security, security and compliance, security, business technology
    
Qualys
Search      

Add Research

Get your company's research in the hands of targeted business professionals.