Homepage
Open in app
Sign in
Get started
Contribute
Tech
Programming
Data Science
Software Development
Cybersecurity
Newsletter
Cybersecurity
Latest
Dispelling Cybersecurity Doubt by Embracing the Future with Confidence and Confronting the Risks of…
Dispelling Cybersecurity Doubt by Embracing the Future with Confidence and Confronting the Risks of…
In a rapidly evolving digital landscape fraught with cyber threats, the risks of maintaining the status quo are dire. Legacy cybersecurity…
Cyber Strategy Institute
May 30
Web API Security Champion Part III: Broken Object Property Level Authorization (OWASP TOP 10)
Web API Security Champion Part III: Broken Object Property Level Authorization (OWASP TOP 10)
Explaining one of the most common web API vulnerability classes — Broken Object Property Level Authorization in a practical manner…
Krzysztof Pranczk
Jun 3
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration
In the ever-evolving landscape of software development and cybersecurity, staying updated with the latest standards and protocols is…
Igor Venturelli
May 24
Unveiling the Vulnerability: How Dell Users’ Data Fell into the Hands of a Hacker
Unveiling the Vulnerability: How Dell Users’ Data Fell into the Hands of a Hacker
Dell Hacker was able to scrape data by directly attacking their servers.
Cyber Strategy Institute
May 16
Tuesday Morning Threat Report: May 7, 2024
Tuesday Morning Threat Report: May 7, 2024
Dropbox has a breach, Microsoft reorganizes around security, and GPS attacks spike
Mark Maguire
May 6
OAuth2: Understanding the Client Credentials Grant Type
OAuth2: Understanding the Client Credentials Grant Type
This is the fourth post of our OAuth2 series. In this post we talk about the client_credentials grant type: why and when to use it.
Igor Venturelli
Apr 30
Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity
Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity
In the ever-evolving landscape of cybersecurity, where threats loom large and breaches can have catastrophic consequences, traditional…
Igor Venturelli
May 3
Access Token or ID Token? Which to Use and Why?
Access Token or ID Token? Which to Use and Why?
This is the second post of our OAuth2 series. In this post we talk about the differences between Access Token and ID Token and when to use…
Igor Venturelli
Apr 26
OAuth2: Understanding the Authorization Code Grant Type
OAuth2: Understanding the Authorization Code Grant Type
This is the third post of our OAuth2 series. In this post we talk about the authorization_code grant type: why and when to use it.
Igor Venturelli
Apr 29
Privacy
Are we stepping into the era of trapped consent?
Are we stepping into the era of trapped consent?
If we are already struggling to keep up with basic, physical consent, how are we to take on digital consent without doubling down on…
Geraldine Lee
May 14
Avoid Monetizing Your Sensitive DNS Data by Using DNSCrypt-proxy
Avoid Monetizing Your Sensitive DNS Data by Using DNSCrypt-proxy
Using a sole encrypted DNS resolver protects against eavesdroppers, but exposes data vulnerability to that only public resolver…
Levente Csikor
Sep 16, 2023
Revolutionizing Communication with Unparalleled Decentralized SIP VoIP — Marina.Rodeo.
Revolutionizing Communication with Unparalleled Decentralized SIP V...
This innovative solution is set to redefine the way we connect, communicate, and collaborate, providing a new horizon for the world of…
Dmitry Sorokin
Aug 11, 2023
How To Self Host Your Own YouTube Instance.
How To Self Host Your Own YouTube Instance.
Unlock control over your content with a self-hosted YouTube instance. Own your data, and TIME !!
Prinux
Aug 12, 2023
About CodeX
Latest Stories
Archive
About Medium
Terms
Privacy
Teams