Injection attacks
Data sanitization involves filtering data from a user, API, or webservice by stripping tags, removing line breaks,and otherwise ensuring the interpreter receives data as intended.
Malware Scan
Malware is malicious software that is intended to damage, disable, manipulate or otherwise corrupt a device, computer, or system. There are lots of different types of malware, including adware, ransomware, worms, trojans, viruses, and other software designed to compromise a system.
Denial-of-service (DoS)
A denial-of-service attack involves overloading networks, servers, and other systems with enough traffic to exhaust resources, deplete bandwidth, and render a service unusable.
Phishing
Attack often used to steal user data including login credentials and credit card numbers. It occurs , masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
Cryptojacking
Attack use malware to turn your device or server into an unwitting participant in a botnet for mining cryptocurrency.
Man-in-the-middle
A man-in-the-middle (MITM) attack involves a criminal secretly intercepting communication between two parties and “eavesdropping” on the transaction. The attacker can also interfere with the transaction by swapping the data payload from one party with malicious code. The attacker must impersonate each endpoint of the transaction.
Cross Site Scripting (XSS)
XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
Security misconfigurations
happen when supposed safeguards still leave vulnerabilities in a website or application. This normally happens when a system or database administrator or developer does not properly configure the security framework of an application, website, desktop or server.