Mike Elissensecuritylevelup.hashnode.net·Aug 11, 2022How hackers can manipulate your API microserviceshttps://www.youtube.com/watch?v=u57A-pZLpvY&list=PLTnRtjQN5iebEDsDmIqpqtXHiI5F_Sqaf&index=3 Time to continue our journey on 'Fundamentals of API Security' and take a look at how hackers can manipulate your API microservices, often leading to financia...Discuss·7 likes·300 readsAPIs
Saloni Guptasecureyourcode.hashnode.net·Dec 30, 2022A Journey into Cybersecurity: A Student's PerspectiveAs a student studying cybersecurity, I've had the opportunity to learn about the various threats facing businesses and organizations today, and the various tools and techniques used to protect against them. It's been a fascinating and rewarding journ...Discuss·4 likes·171 reads#cybersecurity
Kristof Riebbelskriebbels.hashnode.net·Mar 19, 2023The Hidden Dangers of JSONPreviously on... I will take a brief pause from my series on securing and reclaiming control of personal data. To give a little spoiler, it is about using the tool SimpleLogin | Open source anonymous email service. In previous posts, I mentioned that...Discuss·1 like·295 readsSecurityjson
HarshSkillsvariable.hashnode.net·Apr 26, 2023OWASP dependency check pluginOWASP dependency check plugin is a tool used for identifying vulnerabilities in the third-party libraries that are being used in an application. This plugin uses a combination of static and dynamic analysis techniques to identify known vulnerabilitie...Discussowasp
Kristof Riebbelskriebbels.hashnode.net·Mar 19, 2023The Hidden Dangers of JSONPreviously on... I will take a brief pause from my series on securing and reclaiming control of personal data. To give a little spoiler, it is about using the tool SimpleLogin | Open source anonymous email service. In previous posts, I mentioned that...Discuss·1 like·295 readsSecurityjson
Solomon Achugwohsecuredtips.hashnode.net·Mar 18, 2023OWASP Top 10 Security VulnerabilitiesThe Open Web Application Security Project (OWASP) is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. It’s an international security...Discuss·43 readsOWASP TOP 10
buari sulaimonsulaimonbuari.hashnode.net·Jan 19, 2023Introducing Secure CodingThere have been over 8000 software vulnerabilities identified in Q1 2022, where over 50% are high risk to the integrity and confidentiality of these applications, it is also known that it takes an average of 58 days to add a patch to a compromised ap...Discuss·1 like·87 readsSecurity
Saloni Guptasecureyourcode.hashnode.net·Dec 30, 2022A Journey into Cybersecurity: A Student's PerspectiveAs a student studying cybersecurity, I've had the opportunity to learn about the various threats facing businesses and organizations today, and the various tools and techniques used to protect against them. It's been a fascinating and rewarding journ...Discuss·4 likes·171 reads#cybersecurity
Mehul Arorasociallyencrypted.hashnode.net·Nov 23, 2022I do stuffThis is the blog i write when my split personality gets activated. My real self doesn't even know I exist. just like mrrobot.Discussowaspiiitd
Swarupa Raniswarupa.hashnode.net·Nov 5, 2022OWASP Vulnerabilities - Top 10 RulesMany companies and individuals develop their web applications by using React. In React, we have a lot of in-built npm modules to create user-friendly web pages. After developing a web application, many people come to the point of realization of react...Discuss·41 readsowasp
Andrian Kogoshvilikogoshvili.hashnode.net·Sep 3, 2022OWASP TOP 10: Broken Access Control1. Broken Access Control Vulnerabilities that result in users/attackers accessing resources or performing actions that they shouldn't have access to are broken access control vulnerabilities. Three common subcategories of broken access control vulner...Discuss·40 readsOWASP TOP 10owasp
Mike Elissensecuritylevelup.hashnode.net·Aug 11, 2022How hackers can manipulate your API microserviceshttps://www.youtube.com/watch?v=u57A-pZLpvY&list=PLTnRtjQN5iebEDsDmIqpqtXHiI5F_Sqaf&index=3 Time to continue our journey on 'Fundamentals of API Security' and take a look at how hackers can manipulate your API microservices, often leading to financia...Discuss·7 likes·300 readsAPIs
Murali DossforCloudnloud Tech Communitycloudnloud.hashnode.net·Jul 28, 2022OWASP in Security ExplainedOWASP What is OWASP? OWASP stands for Open Web Application Security Project. It is a non-profit foundation that works towards improving the security of the Application or the Software. OWASP foundation is supported by the community that involves open...Discuss·200 readsowasp