Visit HackEDU

HackEDU Blog

Stay up to date

Topic: Application Security

Secure Coding Training Application Security

OWASP Top 10 Mini Series - SQL Injection

Introduction SQL Injection vulnerability allows attackers to alter database queries to take actions other than what the developer intended. This could allow an attacker to bypass...

Continue Reading

Application Security

When should I launch a bug bounty program?

Bug bounty programs - where individuals can receive recognition and compensation for reporting security vulnerabilities - are useful for organizations, especially when developing an...

Continue Reading

Stay up to date