Correct-Auth-KrishnaG-CEO

Ensuring Trust Through Correct Authorisation: A Comprehensive Examination of CWE-863

CWE-863: Incorrect Authorisation occurs when an application fails to enforce correct authorisation measures, allowing unauthorised users or processes to access resources, perform operations, or retrieve data that should be off-limits. It is sometimes conflated with authentication flaws, but the essence of CWE-863 lies in improper or missing checks that would otherwise confirm if a user has the necessary permissions to perform a specific action.
From a technical standpoint, one might imagine an application employing robust identity verification (authentication) only to overlook critical checks about what a user is allowed to do once logged in (authorisation). This oversight can be the gateway to data leaks, privilege escalation, or even sabotage of core business processes.

Insufficient-Cryptography-KrishnaG-CEO

OWASP Top 10 for Mobile Apps: M5 – Insufficient Cryptography

Cryptography, at its core, is the practice of securing communication and data through the use of algorithms and keys. For mobile apps, cryptography plays a crucial role in securing sensitive data, ensuring privacy, and maintaining the integrity of user interactions. However, *insufficient cryptography* occurs when an app fails to implement cryptographic algorithms or methods correctly, resulting in data being exposed or vulnerable to unauthorised access.

The issue of insufficient cryptography is particularly critical in mobile applications because of the increasing amount of sensitive information that these apps handle, such as financial data, personal identification information, passwords, and private conversations. Insufficient cryptography in this context means that sensitive data is not encrypted properly, or that weak or deprecated encryption methods are used, leaving the data open to attackers who can intercept, manipulate, or steal it.

Insecure-Communication-KrishnaG-CEO

OWASP Top 10: M3 – Insecure Communication

Insecure communication occurs when sensitive data is transmitted without adequate encryption or protective measures. This vulnerability enables attackers to intercept, alter, or steal data during transmission, exposing organisations to financial losses, reputational damage, and legal liabilities.

JSON-Injection-KrishnaG-CEO

In-Depth Analysis of SANS Top 25 CWE-94: JSON Injection and Its Implications for Penetration Testers

**JSON Injection** is a form of **injection vulnerability** that occurs when an application improperly handles user input within a JSON object. JSON (JavaScript Object Notation) is widely used for data exchange between web clients and servers. When applications fail to validate or sanitize user input before incorporating it into a JSON object, attackers can inject malicious data, manipulating the application’s behaviour.

JSON Injection primarily targets the integrity of the data being exchanged, potentially altering application logic, bypassing authentication, or even leading to more severe attacks like remote code execution. It is particularly dangerous in systems that use JSON for configuration files, user inputs, or data transfer, which is the case in many modern web applications.

Multi-Stage-Cyber-Attacks-KrishnaG-CEO

Multi-Stage Cyber Attacks: Understanding Their Sophistication and Building Robust Defences

Cyber attacks have evolved into intricate operations, often executed in multiple stages to achieve maximum impact while evading detection. Multi-stage cyber attacks leverage complex execution chains to mislead victims, bypass traditional defences, and deliver devastating outcomes. For organisations and individuals alike, understanding the mechanics of these attacks is essential for crafting effective defence strategies.

Multi-stage cyber attacks are a formidable challenge, but with offensive security techniques, organisations can move from reactive to proactive defence. By adopting vulnerability assessments, penetration testing, cyber forensics, malware analysis, and reverse engineering, businesses can detect and neutralise threats before they escalate.