Frequently Asked Questions

Common Threats Articles

Authentication and Session Management Flaws

Authentication and session management are the parts of a website that handle a...

Security Misconfiguration

Safeguarding your website from malicious users and attacks is important, regardless of...

Cross-Site Scripting

Cross-site scripting (XSS) vulnerabilities let visitor-provided input, such as text in...

Injection Flaws

Injection vulnerabilities let visitor-provided input, such as text in a search or...

What You Need to Know About Phishing Scams

Phishing schemes are attempts to steal sensitive personal information such as...

Unrestricted URL Access

Restricting URL access helps prevent visitors who are not logged in from accessing...

Insufficient Transport Layer Protection

Sensitive data, such as credit card numbers or other personal information, must be...

Insecure Direct Object References

Direct object references expose website or account-specific details, such as account...

Insecure Cryptographic Storage

Websites that need to store sensitive information, such as usernames, passwords or...

Cross-Site Request Forgery

Cross-site request forgery (CSRF) is an attack that takes advantage of a website's...

Identifying, Removing, and Preventing Malware on Your Hosting Server

Malware is short for malicious software. It's a catch-all term that describes harmful...