ALameer AshrafProtecting Your Code: How to Prevent and Fix Sensitive Data Exposure on GitHubAccidentally pushing sensitive data — like passwords, API keys, or personal information — to GitHub can lead to serious security risks…Nov 23
Engr. Md. Hasan MonsurHow to Use Data Annotations to Exclude Sensitive Data in .NET LogsWhile building .NET applications, I often struggled with sensitive data showing up in logs. Discovering data annotations transformed my…Oct 10
Engr. Md. Hasan MonsurSecure and Structured Logging in .NET: Best Practices with Serilog to Prevent Sensitive Data LeaksWhen I started implementing logging in .NET, I realized the risk of unintentionally exposing sensitive data. That’s when I discovered the…Oct 10Oct 10
Abhijeet kumawatDay 6 of 30 Days — 30 Vulnerabilities | Sensitive Data ExposureDay 6: Mastering Sensitive Data Exposure — Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 8Aug 8
It4chis3cDay 6 of 30 Days — 30 Vulnerabilities | Sensitive Data ExposureDay 6: Mastering Sensitive Data Exposure— Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 8Aug 8
ALameer AshrafProtecting Your Code: How to Prevent and Fix Sensitive Data Exposure on GitHubAccidentally pushing sensitive data — like passwords, API keys, or personal information — to GitHub can lead to serious security risks…Nov 23
Engr. Md. Hasan MonsurHow to Use Data Annotations to Exclude Sensitive Data in .NET LogsWhile building .NET applications, I often struggled with sensitive data showing up in logs. Discovering data annotations transformed my…Oct 10
Engr. Md. Hasan MonsurSecure and Structured Logging in .NET: Best Practices with Serilog to Prevent Sensitive Data LeaksWhen I started implementing logging in .NET, I realized the risk of unintentionally exposing sensitive data. That’s when I discovered the…Oct 10
Abhijeet kumawatDay 6 of 30 Days — 30 Vulnerabilities | Sensitive Data ExposureDay 6: Mastering Sensitive Data Exposure — Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 8
It4chis3cDay 6 of 30 Days — 30 Vulnerabilities | Sensitive Data ExposureDay 6: Mastering Sensitive Data Exposure— Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 8
br4ind3adOWASP Top 10 | TryHackMe | Sensitive Data Exposure Task 8–11Task 11 challenge at the bottom.Jun 29, 2021
ScrypTicOWASP TOP 10- DAY 3: Sensitive Data ExposureRoom LINK: https://tryhackme.com/room/owasptop10Jul 16, 20201