Cristhian Cano Bogadoparaguayandev.hashnode.dev·a day agoBuenas Prácticas de Seguridad en Oracle APEX: Evita la Inyección SQLLa inyección SQL es una de las vulnerabilidades más comunes y peligrosas en aplicaciones web. En el caso de Oracle APEX (Application Express), aunque la plataforma ofrece protecciones integradas, también es posible que los desarrolladores introduzcan...Apex
Nicholas Diamondnicholasdiamond.hashnode.dev·Oct 18, 2024Hardening Node.js APIs Against Injection Attacks and Data BreachesAPI security is a critical aspect of building modern applications, especially as the threat landscape continues to evolve. Among the most common attack vectors targeting APIs are injection attacks, such as SQL injection and NoSQL injection. These att...232 readsNode.js
Atharv Patilatharvpatil.hashnode.dev·Oct 3, 2024Understanding Server-Side Template Injection (SSTI)Server-Side Template Injection (SSTI) is a significant vulnerability in modern web applications, enabling attackers to inject malicious code into server-side templates. This flaw arises when user inputs are improperly handled and directly embedded in...1 like·38 readsServer-Side Template Injection
Vaibhav Kashyapvaibhav16.hashnode.dev·May 16, 2024JavaScript PrototypeUnderstanding JavaScript is sometimes nothing less than an Adventure, today I am sharing with you one of JavaScript's concept called the prototypes. I never went into this detail with the prototypes and what made me to dive deep into this was prototy...2 likes·39 readsJavaScript
Venkat Rvenkatr.hashnode.dev·May 15, 2024Building Fort Knox for Your Data: Essential API Security Best PracticesAPIs are the backbone of modern applications, enabling seamless communication between systems and unlocking a world of integrations. But with great power comes great responsibility – ensuring your APIs are robust against security threats is paramount...ThreatScape
Venkat Rvenkatr.hashnode.dev·May 12, 2024Locking Down the Digital Gateway: A Deep Dive into API Security Best PracticesAPIs (Application Programming Interfaces) are the backbone of modern software, enabling communication between different applications and services. However, the ubiquity of APIs also makes them a prime target for attackers. This comprehensive guide wi...Secured APIs
Kaustubh Rairaikaustubh.com·Mar 9, 2021OWASP Top 🔟 2017Every cyber-security enthusiast has once come upon these terms OWASP Top 10. The Top 10 here means Top 10 Vulnerablities, the greatest software risks for any Web Application. OWASP is just an online community/non profit foundation that helps to impro...Postsdata exposure