Preeti Samuelpreetisamuel.hashnode.dev·Mar 2, 2024What is GRC?Introduction GRC is a business framework that combines governance, risk management, and compliance activities, ensuring legal and ethical operations and effective risk management through the coordination of policies, processes, and technology Organiz...Discussgrc
Pranav ShikarpurforPangea Blogpangea.cloud·Feb 14, 2024Integrate an Audit Trail for NextAuth.js in a few lines of codeIn the world where hackers are trying to brute force user accounts (23andMe breach 2023) and session tokens are being stolen (OKTA breach 2023) to impersonate authenticated users and run critical user actions, it is highly important for developers to...DiscussSecurity
James Cookjamescook.dev·Dec 6, 2023EntraID: Switch back to previous Audit Logs experienceWhy change to legacy audit logs experience The biggest flaw in the new Audit Logs experience is that the filters cannot search a value, resulting in manual scrolling. New experience: Old experience: How to switch back Within the Audit Logs window, ...Discuss·71 readsEntra ID
Gabi DobocanforSandwormblog.sandworm.dev·Sep 25, 2023PHP & Composer Support Is Here! 🐘We're excited to announce Sandworm is adding support for PHP via the Composer package manager. Composer has over 300,000 packages available, covering a wide range of functionality. This includes packages for web development, APIs, microservices, data...Discuss·579 readsPHP
Jamaltheatlanteanjamaltheatlantean.hashnode.dev·Sep 15, 2023Mastering Solidity VulnerabilitiesA good blockchain developer can account for a ton of reasons why Smart Contract Security should be taken seriously. The total amount of funds lost due to smart contract hacks totals $2.7 billion- a 1250% increase from 2020, sourced from BanklessTimes...Discuss·21 likes·35 readsSolidity
BuildBearbuildbear.hashnode.dev·Sep 8, 2023Most Common Vulnerabilities In Solidity: In-Depth Part 2This article will guide you through some of the most common vulnerabilities in Solidity, including Flashloan, overflow and underflow, tx.origin, Insecure Randomness, and Improper Input Validation Attacks. If you haven’t already, please check out Part...DiscussSolidity
BuildBearbuildbear.hashnode.dev·Sep 8, 2023Most Common Vulnerabilities In Solidity: In-Depth Part 1This article will walk you through some of the most common vulnerabilities in Solidity, such as Reentrancy, Incorrect Calculations, Oracle Failure/Manipulation, Weak Access Control, and Frontrunning Attacks. Not only that, but we’ll guide you on the ...DiscussSolidity
Gabi DobocanforSandwormblog.sandworm.dev·Sep 1, 2023🎡 Audit Your Workspaces With Sandworm v1.46.0Today we're excited to bring you some highly anticipated additions to our Audit and Cloud products: monorepos, workspaces, and npm v1 lockfile support. Monorepo Support Sandworm Cloud now scans repos for directories that contain a package.json manif...Discuss·299 readsJavaScript
CrabNebulaforCrabNebulacrabnebula.hashnode.dev·Jul 24, 2023Security Advisory for Tauri 1.4 (CVE-2023-34460)This post shares insight into the most recent Tauri security advisory, affecting the Tauri 1.4 release. You can learn more about the release itself on the Tauri Blog Post. The issue was discovered during an internal audit performed by our Director of...Discuss·7 likes·40 readsTauri
Fora Softforasoft.hashnode.dev·Jun 7, 2023What Is Code Auditing And How to Conduct It: Evaluation CriteriaWriting code is just like solving a math problem: there’re many multiple ways you can do it, but there’s only one correct result. To make sure the solution you or another developer have chosen is correct, you can carry out code auditing. We do it as ...Discussaudit