Harshal Shahdelvingwithharshal.hashnode.dev·Oct 17, 2024Protecting Your Systems: A Guide to XML External Entity AttacksWhat is XML External Entity (XXE)? Before diving into XXE attacks, let’s first understand XML (Extensible Markup Language). XML is a markup language that structures and stores data in a format readable by both humans and machines. Originally develope...Fortify and Defend: Navigating the Cybersecurity Landscapexml external entity
Harshal Shahdelvingwithharshal.hashnode.dev·Oct 9, 2024Comprehensive Guide to Brute Force Attacks: Examples, Detection, and Prevention TacticsIn the realm of cybersecurity, Brute Force Attacks stand as one of the most fundamental and common threats. Despite their simplicity, they can be incredibly dangerous if left unchecked. This blog explores what a brute force attack is, presents a real...Fortify and Defend: Navigating the Cybersecurity Landscapebruteforcing
Harshal Shahdelvingwithharshal.hashnode.dev·Oct 2, 2024Directory Traversal Attacks Explained: How to Detect and Stop ThemDirectory Traversal, also known as Path Traversal, is a serious web vulnerability that allows attackers to gain unauthorized access to the server’s filesystem by manipulating input paths. By exploiting this vulnerability, an attacker can access files...Fortify and Defend: Navigating the Cybersecurity Landscapebugbounty
Harshal Shahdelvingwithharshal.hashnode.dev·Sep 25, 2024Open Redirection Attacks: Comprehensive Analysis with Practical CasesIn the world of web application security, Open Redirection Attacks often go unnoticed but pose significant threats if left unchecked. These attacks can be exploited by malicious actors to redirect unsuspecting users to untrusted or malicious websites...Fortify and Defend: Navigating the Cybersecurity Landscapeopen redirection
Harshal Shahdelvingwithharshal.hashnode.dev·Sep 17, 2024LFI and RFI: A Deep Dive with Real-World ExamplesLFI (Local File Inclusion) and RFI (Remote File Inclusion) are two common web application vulnerabilities that allow attackers to include files on the server, potentially leading to unauthorized access, code execution, or data disclosure. LFI (Local ...76 readsFortify and Defend: Navigating the Cybersecurity Landscapecode security
Abhiramcloudbuddy.hashnode.dev·Jul 30, 2024Dependency Management and SecurityModern software development heavily relies on third-party libraries and packages to accelerate development and leverage existing functionalities. While these dependencies offer numerous benefits, they also introduce significant security risks. This a...vulnerability
Sumit Mondalsumit007.hashnode.dev·May 20, 2024Exploring AWS Signer: Safeguarding Code Integrity with EaseIn today's rapidly evolving digital landscape, ensuring the integrity and security of your code is paramount. As organizations embrace cloud-native architectures and DevOps practices, the need for robust code-signing solutions becomes increasingly ap...AWS - HandsOnAWS
Yarelys Riveracyberyara.com·Apr 5, 2024Safeguard Your Code: 6 Basic Vulnerabilities to Avoid and Tips to Improve Your Code SecurityIn the coding world, even the smallest oversight can pave the way for security vulnerabilities, leaving your application susceptible to exploitation by malicious actors. Cybersecurity incidents are rising and will continue as long as there is vulnera...code security
Gaurav Chaudharypixelgig.pro·Mar 29, 2024Learning Cyber Security Day 4 - Integrating Encryption in Your Code🔐Alright code warriors, we peeled back the layers of encryption yesterday, understanding its power in safeguarding sensitive data. Now, let's get our hands dirty and explore how to integrate this crucial weapon into your code! Choosing the Right Tool ...Cybersecurity Bootcamp: My Daily Grind to ExpertiseWeb Development
Deep Nandredeepnandre.hashnode.dev·Mar 8, 2024Enhancing Developer-Driven Security with Snyk IntegrationIn the fast-paced world of software development, there's a delicate dance between the need for speed and the imperative of security. Historically, these two forces have often been at odds. Developers have long been caught in the crossfire, striving t...1 like·33 readsDeveloper Security Tools