Shai AlmogforDebugging, Java, JVM and Open Sourcecodenameone.hashnode.net·Feb 14, 2023Java Serialization Filtering - Prevent 0-day Security VulnerabilitiesI’ve been a Java developer long enough to remember the excitement when Sun introduced the concept of serialization in the JVM. In the world of C, we could just write a struct into a file but this was always problematic. It wasn’t portable and had man...Discuss·20 likes·392 readsJava
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Dec 18, 2022Top 5 Common Web Application VulnerabilitiesWeb application attacks are involved in 26% of all breaches, and app security is a concern for enterprises. The size of a startup does not exempt it from cyber-attacks – that's because hackers constantly scan the internet looking for flaws. It takes ...Discuss·10 likes·390 readsWeb Development
Alex AquinoforAlex Aquino's Blogefficiencygeek.hashnode.net·Sep 26, 2022Top 3 Application Security Concerns for the DeveloperYou are a developer working on your app, and while you know security is critical to building trust, you'd rather focus on the cooler features of your application. Why this post on Application Security? As I started my journey into modern application ...Mariel Aquino and 1 other are discussing this2 people are discussing thisDiscuss·6 likes·235 readsApplication Security
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.net·Apr 24, 2023Methods for Bypassing Authentication VulnerabilitiesOverview Authentication Bypass Vulnerabilities are common flaws in web applications today, but they are not always easy to find. With the continuous development of technology and the integration of various platforms, traditional authentication method...Discuss#cybersecurity
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.net·Apr 24, 2023The Unbounded Loops Vulnerability: Denial of ServiceUnbounded Loop Vulnerability: An unbounded loop vulnerability is a kind of security flaw that may arise in smart contracts when a loop lacks a defined maximum iteration limit. This implies that the loop can run indefinitely, potentially using up all ...Discuss#cybersecurity
Stephen PaulforStephen Pauliamstepaul.hashnode.net·Apr 7, 2023Top 10 Vulnerabilities in Web SecurityIn our world today, web security is a critical concern for any web application. Web applications are susceptible to numerous security vulnerabilities that can compromise data and functionality. The Open Web Application Security Project (OWASP) lists ...Discusswebsecurity
Faris MohamedforFaris Mohamed's Blogfarismohamed.hashnode.net·Apr 3, 2023The Fundamentals of API Security: How to Keep Your APIs Safe and SecureIn today's digital age, APIs are a critical component of web applications. They allow different systems to communicate with each other, making it possible for developers to create complex and innovative applications. However, with this increased conn...Discuss·78 readsAPIs
Pankaj SinghforPankaj's Blogpankaj007.hashnode.net·Mar 23, 2023Using data science to identify and mitigate vulnerabilities in networksIntroduction Data science is a powerful tool for identifying and mitigating vulnerabilities in networks. With the increasing sophistication of cyber attacks, it has become more important than ever for organizations to proactively identify and address...DiscussData Science
Solomon AchugwohforSecuredtipssecuredtips.hashnode.net·Mar 18, 2023OWASP Top 10 Security VulnerabilitiesThe Open Web Application Security Project (OWASP) is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. It’s an international security...Discuss·43 readsOWASP TOP 10
Santosh AcharyforSantosh Acharysantoshachary.hashnode.net·Feb 25, 2023Installing Nessus on a raspberry pi 4Usage: Someone may ask, till now people were installing Nessus on a virtual machine or a server and it works fine. Then why on a raspberry-pi. The simple answer is that we can carry this cheap kit anywhere and can run in a network and nobody can noti...Discuss·81 readsRaspberry Pi
Rajeeban AforBountry Hunterbountryhunter.hashnode.net·Feb 23, 2023How to be Safe From HTTP PUT Vulnerability?In recent years, the increase in cyber attacks has made internet security an essential aspect of our digital lives. One of the most common methods of these attacks is the HTTP PUT vulnerability. HTTP PUT is a method used in the Hypertext Transfer Pro...Discusshttp
Brettfori.haxxhaxx.hashnode.net·Feb 20, 2023Loose OAuth Callback URL Matching Leaks Response Codes in GitHubBelow discusses a vulnerability I found in GitHub's OAuth Integration. This affects both Github.com and GitHub Enterprise. TL;DR An attacker that can control the subdomain of a domain used in the Authorization callback URL when configuring OAuth inte...Discuss·33 readsoauth
Shai AlmogforDebugging, Java, JVM and Open Sourcecodenameone.hashnode.net·Feb 14, 2023Java Serialization Filtering - Prevent 0-day Security VulnerabilitiesI’ve been a Java developer long enough to remember the excitement when Sun introduced the concept of serialization in the JVM. In the world of C, we could just write a struct into a file but this was always problematic. It wasn’t portable and had man...Discuss·20 likes·392 readsJava