Alao Abiodun AbdulRahmanforAfricanDevabiodundev.hashnode.net·Mar 3, 2023The ABCs of NodeJS Security: Understanding Common TerminologyIntroduction Security as a developer refers to the process of developing software with security considerations in mind to minimize the risk of security breaches, data leaks, memory leaks, and other malicious and malware attacks. It involves designing...Adetayo Akinsanya and 1 other are discussing this2 people are discussing thisDiscuss·11 likes·78 readsSecurity
Tiago Rangel de SousaforTiago's notestiagorangel.hashnode.net·Feb 5, 2023Best practices for securing your web appsSecuring your web application is a crucial step in ensuring the safety of your users' data and your business. With the increasing frequency of data breaches and cyber attacks, it's important to make sure your web application is as secure as possible....Discuss·1 likeSecurity
Mạnh Đình Nguyễnforcybndmcyb.hashnode.net·Apr 2, 2023Bounty in just 5 minutes through IDORHello Bounti-ers, Here is an easy finding which I want to share... After I recon with my custom bash, as normal, scan first and manual at the same time. While waiting for the scanning to end, I actively seek all test case logic in my target. Sign up ...Discuss·1 likesecurity testing
Mạnh Đình Nguyễnforcybndmcyb.hashnode.net·Apr 2, 2023Bounty in just 5 minutes through IDORHello Bounti-ers, Here is an easy finding which I want to share... After I recon with my custom bash, as normal, scan first and manual at the same time. While waiting for the scanning to end, I actively seek all test case logic in my target. Sign up ...Discuss·1 likesecurity testing
Emin MuhammadiforArticles by Emin Muhammadieminmuhammadi.hashnode.net·Mar 12, 2023Security Testing in Software Engineering: Why It Matters and How to Do It RightIn software engineering, security is a critical concern, and software security testing is an essential process to ensure that software is safe from potential vulnerabilities and weaknesses that can be exploited by attackers. In this article, we will ...Discuss·33 readsSecurity
Bilel BougarneforZer0daybilelbougarne.hashnode.net·Mar 7, 2023How to Start in Cybersecurity ?Why cybersecurity? Cybersecurity is one of the most trending fields in IT because, As technology grows risks will grow in parallel, and to prevent those risks we have to learn whats called 'Cybersecurity', but the question is how?. Where to start? St...Discuss#cybersecurity
Alao Abiodun AbdulRahmanforAfricanDevabiodundev.hashnode.net·Mar 3, 2023The ABCs of NodeJS Security: Understanding Common TerminologyIntroduction Security as a developer refers to the process of developing software with security considerations in mind to minimize the risk of security breaches, data leaks, memory leaks, and other malicious and malware attacks. It involves designing...Adetayo Akinsanya and 1 other are discussing this2 people are discussing thisDiscuss·11 likes·78 readsSecurity
Md. Niaz MorshedforMd. Niaz Morshedniazmorshed1494.hashnode.net·Feb 26, 2023Basics of Security TestingThe foremost purpose of Security Testing is to identify the threats in the system and measure its potential vulnerabilities, so the threats can be encountered and the system does not stop functioning or can not be exploited. It also helps in detectin...DiscussSecurity
Tiago Rangel de SousaforTiago's notestiagorangel.hashnode.net·Feb 5, 2023Best practices for securing your web appsSecuring your web application is a crucial step in ensuring the safety of your users' data and your business. With the increasing frequency of data breaches and cyber attacks, it's important to make sure your web application is as secure as possible....Discuss·1 likeSecurity
Brian WachiraforDaily Tech Bytes.dailytechbytes.hashnode.net·Jan 18, 2023Common API Security Testing MisconceptionsAPI security concerns have significantly increased with the rapid adoption of APIs in cloud, web, and mobile applications. Research conducted by 451 Research on the state of API security in 2022, noted that 41% of companies had an API security incide...Discussapi
Zach WingoforThe Sentinelwingo.hashnode.net·Dec 5, 2021The Detect Function of the NIST Cybersecurity FrameworkIn our ongoing series on the NIST Cybersecurity Framework, we have previously covered the identify and protect functions. In this article, we will delve deeper into the detect function, which is an essential component of any comprehensive cybersecuri...DiscussNIST
Asad Ali BalochforAsad Ali Baloch's blogbeyondlight.hashnode.net·Dec 25, 2022What is OSCPAs your career progresses, you'll have more chances to acquire new knowledge and skills in a changing field. People around you will frequently ask you questions at some point. Do individuals frequently get some information about what is SCM accredita...Discusshacking
Chidiogoforaniediogo's bloganiediogo.hashnode.net·Oct 12, 2022Find The Right Tools For DevSecOpsWhen looking for the right tool set for DevSecOps practice, tool selection is often a teamwork effort and it usually starts with the team finding out what they are currently working on. Which tools have been previously used, why a new one is needed, ...Discuss·1.1K readsDevSecOps