Priyabrata SahaBulletproof Angular: Best Practices for Cybersecurity in Web ApplicationsAs cyberattacks grow more sophisticated, web application developers must prioritize security at every stage of development. Angular, being…15h ago
Ajay YadavUsing HTTPOnly and Secure Cookies on web servers: how to Do itA lot of people think that session cookies are one of the worst things about HTTP for security and privacy, but current web apps need to…Nov 23, 2023
Ajay MongaHow An Authorization Tool like Cerbos Helps To Minimize Access Control VulnerabilitiesMinimizing Access Control Risks with Cerbos3d ago3d ago
InInfoSec Write-upsbySupun Halangoda (Suppa)How a Unique Combination Opened the Door to an IDORHello everyone! This write-up is part of my IDOR Diaries series, where I share insights on the various IDOR vulnerabilities I encounter…Nov 103Nov 103
SHILPA BEHANIThe Comprehensive Guide to OWASP Top 10: Understand, Examples, and Mitigation Strategies 🛡In today’s digital era 🌐, web applications power everything from e-commerce to financial systems. However, this reliance comes with risks…2d ago2d ago
Priyabrata SahaBulletproof Angular: Best Practices for Cybersecurity in Web ApplicationsAs cyberattacks grow more sophisticated, web application developers must prioritize security at every stage of development. Angular, being…15h ago
Ajay YadavUsing HTTPOnly and Secure Cookies on web servers: how to Do itA lot of people think that session cookies are one of the worst things about HTTP for security and privacy, but current web apps need to…Nov 23, 2023
Ajay MongaHow An Authorization Tool like Cerbos Helps To Minimize Access Control VulnerabilitiesMinimizing Access Control Risks with Cerbos3d ago
InInfoSec Write-upsbySupun Halangoda (Suppa)How a Unique Combination Opened the Door to an IDORHello everyone! This write-up is part of my IDOR Diaries series, where I share insights on the various IDOR vulnerabilities I encounter…Nov 103
SHILPA BEHANIThe Comprehensive Guide to OWASP Top 10: Understand, Examples, and Mitigation Strategies 🛡In today’s digital era 🌐, web applications power everything from e-commerce to financial systems. However, this reliance comes with risks…2d ago
Aqeel AhmadCode Obfuscation in React Native: A Comprehensive GuideIntroduction Code obfuscation is a technique used to make code difficult to understand and analyze. In React Native, code obfuscation can…Feb 23
Sakshi from KushoAIModern Security Vulnerabilities: Lessons from Recent BreachesThis blog is written by Jeremy Rivera at KushoAI. We’re building the fastest way to test your APIs. It’s completely free and you can sign…Dec 4
InInfoSec Write-upsbySandeep SaxenaEverything About Secure Code Reviews: Mastering SAST Techniques for Robust SoftwareAbstractNov 25