CORS (Cross-Origin Resource Sharing): A Complete Guide
An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts
XSS: What it is, how it works, and how to prevent it
What is ethical hacking and penetration testing? Get paid to hack
Resources to get you started in Cybersecurity (for free).
Cyber Security Introduction (part 3: Man in the Middle )
What actually happens when you leak credentials on GitHub: The experiment
Understanding And Implementing Password Hashing In NodeJS.
TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP
CSRF Attacks & Prevention: How To Secure Your Web Application (2021)
.NET 5: How to authenticate & authorise API's correctly
Linux for hackers - basically this article covers for all
[BREAKING] FireEye hacked, red team tools leaked. Resources to protect yourself.
Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python
Understanding Unikernels: The Future of Cloud Computing, Probably
Cyber Security Introduction (part 4: Denial Of Service)
Parler wasn’t hacked: It just lacked the most basic security & privacy measures
Cookie Security: 10 Tips To Protect Your Web Application
Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention
Where (and how) can a web developer learn more about cyber security?
8 free security tools every developer should know and use to Shift Left
Creating a Windows Project in Visual Studio [Windows PE Internals]
In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One