niraj choubeyExploiting GraphQL API SuggestionsGraphQL APIs are everywhere. That statement should intrigue you to learn GraphQL and security test its implementation in different apps…22h ago
CurityBest Practices for Storing Access Tokens in the BrowserWhen storing tokens, you should weigh the choice of storage against the security risks. Find out about the best solution.Apr 19
Aman GuptaXSS BYPASS on Web Application with API via Possible WaysOWASP Juice Shop is a deliberately insecure web application designed to educate users about common security vulnerabilities, particularly…2h ago2h ago
Aqeel AhmadHandling JWT Access Token & Refresh Token using Axios in React | React Native App — 2024Comprehensive Guide to Managing JWT Access and Refresh Tokens in Web & Mobile ApplicationsApr 195Apr 195
SemaphoreAPI Security Best Practices: Protecting Your Data in TransitApplication programming interfaces (APIs) are the backbone of modern web development, enabling communication between online applications…1d ago1d ago
niraj choubeyExploiting GraphQL API SuggestionsGraphQL APIs are everywhere. That statement should intrigue you to learn GraphQL and security test its implementation in different apps…22h ago
CurityBest Practices for Storing Access Tokens in the BrowserWhen storing tokens, you should weigh the choice of storage against the security risks. Find out about the best solution.Apr 19
Aman GuptaXSS BYPASS on Web Application with API via Possible WaysOWASP Juice Shop is a deliberately insecure web application designed to educate users about common security vulnerabilities, particularly…2h ago
Aqeel AhmadHandling JWT Access Token & Refresh Token using Axios in React | React Native App — 2024Comprehensive Guide to Managing JWT Access and Refresh Tokens in Web & Mobile ApplicationsApr 195
SemaphoreAPI Security Best Practices: Protecting Your Data in TransitApplication programming interfaces (APIs) are the backbone of modern web development, enabling communication between online applications…1d ago
Azhari HarahapBroken Authentication Leads to the Ability to Unsubscribe Other Users' RemindersIn this post, I will show you how I discovered a Broken Authentication vulnerability at the Reminders Unsubscribe endpoint.Sep 4
Usma KhanAPI Security 101: 🔒 Protecting Your Endpoints from Common Threats 🚫Discover the essentials of securing your APIs against the most common and dangerous attacks.2d ago
Kalpa SenanayakeService-to-service authentication & authorisation patternsSecuring micro-service communicationNov 28, 20225