Skip to content
loading...

#watercoolerI was emailed after abandoning a registration form. I did not click Submit. This is not ok.

Reactions 49 Comments 9
3 min read

[TryHackMe.com] Erit Securus I writeup

Reactions 5
4 min read

Baby's First Hash Encryption

Reactions 3
5 min read

Hardening Docker Container Using Seccomp Security Profile

Reactions 12
3 min read

(Write-up) pwnable.kr :: fd

Reactions 3
1 min read

Scanning web application with OWASP ZAP

Reactions 5
3 min read

10 Rules for Protecting your Computer from Malware

Reactions 3
4 min read

DevSecOps – the key to avoid security breaches

Reactions 3
5 min read

Have you any bot to recommend in order to test website security (SQL Injections or others) ?

Reactions 5 Comments 2
1 min read

How to Do Security Testing Manually: 12 Effective Ways

Reactions 6
10 min read

immudb is an open source, high-speed immutable database for systems and applications

Reactions 9
2 min read

Manage your secrets in Git with SOPS - Common operations

Reactions 9
2 min read

Azure SSL Certificate! WebApp!! WAF!!!

Reactions 2
2 min read

API Security for the Data Layer

Reactions 6
3 min read

#todayilearnedCLOCKS in Linux

Reactions 3
1 min read

Bye bye Feature-Policy, hello Permissions-Policy

Reactions 3
3 min read

IAM Policy for humans

Reactions 5
2 min read

Ways hack a Website #1

Reactions 3
2 min read

Cyber 101 - Glossary

Reactions 2
1 min read

What is IAM? (A beginner's guide)

Reactions 18
5 min read

Securing Single-page Applications with OpenID Connect

Reactions 3
1 min read

#helpConcerns regarding using payment with graphql and js in general

Reactions 10 Comments 4
1 min read

Structure of an SSL (X.509) certificate

Reactions 5
16 min read

Y Messenger: a Decentralized Blockchain-based* Communication Tool

Reactions 5
4 min read

#todayilearnedAre you storing your files correctly? Let’s explore a real-world backend issue.

Reactions 5
2 min read

#todayilearnedLearning the CTF way! : 1/n

Reactions 9
2 min read

#discussWebsite users' security vs usability, and does it mean anything for (smaller) webdevs?

Reactions 14 Comments 1
1 min read

Choose Distroless containers by default

Reactions 3
4 min read

Securing express js server

Reactions 4
1 min read

How to Perform Threat Modeling & Security Analysis in 5 Steps

Reactions 9
5 min read

Best practices to use AWS access key and secret in your development environment

Reactions 5 Comments 3
4 min read

Learn what is CSRF attack by hacking an online Casino

Reactions 66 Comments 1
6 min read

How to ensure you have the right security headers

Reactions 5
13 min read

Hacker101 CTF - Hello World!

Reactions 9
4 min read

[TryHackMe.com] Basic Pentesting Writeup

Reactions 29
6 min read

Security news weekly round-up - 29th May 2020

Reactions 4
3 min read

#discussIs open-sourcing server-side code a security threat?

Reactions 11 Comments 19
1 min read

SSL Pinning

Reactions 4
6 min read

5 NPM and Node tips to make your dev machine safer

Reactions 28
4 min read

Implementing Facebook Login on iOS without the Facebook SDK

Reactions 6 Comments 2
14 min read

Setting up wordpress Multisite

Reactions 9
8 min read

AWS Cloud

Reactions 4
1 min read

(Write-up) Phoenix :: Stack Zero

Reactions 4
2 min read

Protect your application from CSRF attacks

Reactions 46 Comments 4
9 min read

How to enable CSRF protection in the Python / Flask app?

Reactions 5
2 min read

How to TPM - Part 1

Reactions 4
5 min read

Ensure services like Elasticsearch are not accessible from outside using Postman monitoring

Reactions 5
3 min read

Scammers signed up, scammed us of $870 in 15 minutes.

Reactions 28 Comments 2
5 min read

8 free security tools every developer should know and use to Shift Left

Reactions 7
7 min read

Secure way of doing OAuth for SPA & Native Apps

Reactions 20
3 min read

Como seria a sua vida se a internet fosse feita de sites do http://governo?

Reactions 7 Comments 1
6 min read

Testing sign-up with real emails - Selenium Java email API tutorial (with examples)

Reactions 3
5 min read

What Exactly Do CyberSecurity Professionals Do 🤔?

Reactions 19 Comments 2
1 min read

User authorization in micro-service architecture with JWT

Reactions 6
3 min read

Security and performance tips and tricks for your GraphQL servers

Reactions 12 Comments 1
7 min read

All about aria-current attribute

Reactions 14
2 min read

How to choose and care for a secure open source project

Reactions 53 Comments 1
7 min read

CVE-2020-10187

Reactions 18 Comments 3
1 min read

What are the Differences Between DevOps and Agile? (Infographic)

Reactions 3 Comments 1
1 min read

(Python) Avoid SQL injection when using MySQLCursor.execute()

Reactions 3
1 min read
loading...