Codesealer Blog

Cross-Site Scripting (XSS) Attacks

Cross-site scripting (XSS) attacks are a prevalent type of web application vulnerability that poses a significant threat to browser security. An XSS attack occurs when a malicious script is injected into a trusted website, often with the intent to steal sensitive information, manipulate site content, or redirect users to other malicious websites. This breach of [...]

Why You Should Secure Your Browser

Browser exploits have become a common attack vector for hackers, who use various techniques to exploit vulnerabilities in web browsers. These vulnerabilities may allow hackers to download and execute malicious code when a user visits a compromised site. One of the most dangerous forms of browser exploits is the "drive-by download" attack, which can download [...]

The most popular cyber attacks in 2022

In 2022, cyberattacks continued to evolve and become more sophisticated, but some of the most popular types of attacks still involved malware, including Trojans, computer viruses, and adware. Trojans remained the most prevalent type of malware, accounting for 58% of all computer malware. These programs are often disguised as legitimate files or software, and once […]

Application Security For Retail & ECommerce Applications

The state of application security in banking applications is an ongoing concern, especially as the industry continues to undergo digital transformation. With the increased adoption of mobile and web-based applications, the complexity and scale of digital infrastructure and applications have also increased, making application security a critical concern. As a result, banks must implement strong […]

Application Security For Banking

The state of application security in banking applications is an ongoing concern, especially as the industry continues to undergo digital transformation. With the increased adoption of mobile and web-based applications, the complexity and scale of digital infrastructure and applications have also increased, making application security a critical concern. As a result, banks must implement strong […]

Essential Qualities Of Highly Successful End To End Encryption

Now, the entire world and business operations are running on ciphers and codes.  From shopping online, entertainment, and ATMs to emails, cryptography occupies your every waking moment. It is a well-recognized fact that life is practically not possible without security. When it comes to cryptography, it is entirely about secret communication.  The main goal of […]

Targeted Malware

As the name suggests, targeted malware is a set of cyberattacks that are explicitly designed to target a particular organisation, to steal very sensitive info. Malware has several meanings, such as: · Crime wares · Viruses · Trojans · Spyware · Adware · Worms · Rootkits and literally, everyone is a At risk – targets […]

Session Hijacking & Cookies

What is a Session Hijacking Attack?Page Contents0.0.0.0.1 What is a Session Hijacking Attack?1 1.0.0.0.1 How does session hijacking work?1.0.0.0.2 Countermeasures to Session Hijacking On a website, cookies and Sessions are used to store information. Cookies are a tasty treat for malicious hackers. Once an attacker gets their hands on a session ID, they can get […]

The most popular Cyperattacks 2020

  Almost 40 % of cyber-attacks in 2019 were performed using “cross-site scripting”, the most popular attack vector globally, according to a recent PreciseSecurity’s research. Based on the same source, the SQL injection is the globally used second-most attack vector, followed by fuzzing.     What is a cross-site scripting attack?Page Contents1 What is a […]

Vulnerabilities of Ajax

Ajax is used to create fast, efficient, and better web applications using HTML, CSS, XML, and JavaScript. It uses DOM and JavaScript for dynamic content displaying. Why Ajax ·  User friendly · Freeform server · Live data binding · Client-side programming tool · Minimized server-based resources’ usage · Capable of developing efficient and more interactive […]