ITSG Blog

File Upload Attack

File upload vulnerabilities represent one of the most critical security risks faced by web applications. As businesses increasingly rely on user generated content and file

Linux VPN Connection Issues

One of the common issues faced by Linux users when using a VPN is the inability to connect orfrequent disconnections. This issue is often caused

Email injection

As someone who thrives on exploring the intricacies of security vulnerabilities, I believe in sharing the techniques and knowledge I use in real-world projects can

Store XSS On Cryptocurrency Website

Sometimes vulnerability is in the simplest things that cannot be seen…I haven’t felt like working much lately. I’ve mostly been studying and doing a little

RECON (Reconnaissance)

RECON or Reconnaissance in web security is the first and one of the most important stages of security assessment. This stage includes gathering information about

CORS VULNERABILITY

The CORS vulnerability, which stands for Cross-origin resource sharing, is one of the most dangerous vulnerabilities, in the sense that an intruder can obtain various

CSRF VULNERABILITY

A CSRF attack usually targets state-changing actions like deleting records, changing passwords, buying products, or sending messages. Hackers often use social engineering to send malicious

DOS & DDOS ATTACK

In a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack, a hacker or intruder sends a large number of malicious and half-open requests to a server

CloudLinux

Advanced and sophisticated attacks now being deployed by anonymous individuals havesignificantly increased the importance of security in the web and hosting spaces. Given theplethora of