Prismo Blog

White paper: Detection of Injection Exploitation

Web injection exploitation has ruled as the top web application vulnerability for  over a decade. Injection flaws include SQL, NoSQL, OS command and LDAP injection techniques. In this Prismo white paper, we discuss the detection algorithms the...