Nikhil Pandeynikhilpandeydigital.hashnode.dev·Mar 15, 2024Decoding Security Debt: Differentiating It from Tech Debt and Ways to Tackle ItIn the fast-paced world of technological advancements, organizations often face the dilemma of balancing innovation with security. Tech debt and security debt are two terms commonly used in the realm of software development and cybersecurity. Underst...Discuss·10 likesSecurity debt
Shahi ShreshthforTechLearn Indiablog.techlearnindia.com·Mar 15, 2024Level Up Your Security Game: OWASP Top 10 is Your EndgameTurning Security Headaches into Creative Problem-Solving The digital world thrives on innovation, but with every new advancement comes a new set of security challenges. This is where the Open Web Application Security Project (OWASP) comes in, not jus...Discussavengers
Alice Githuialicegithui.hashnode.dev·Mar 12, 2024OWASP Top 10 2023The OWASP (Open Worldwide Application Security Project) Top 10 is a regularly released report that details the security risks for web application security, focusing on the top 10 security concerns. It aims to provide tools and resources to make web a...DiscussOWASP TOP 10
Nicolas FränkelforApache APISIXapisix.hashnode.dev·Feb 8, 2024Hardening Apache APISIX with the OWASP's Coraza and Core RulesetThe Open Worldwide Application Security Project is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security. The OWASP provid...Discuss·1 likeowasp
Ian Carsoniancarson.hashnode.dev·Jan 20, 2024OWASP Top 10 API Security Risks.Below are Top 10 OWASP API Security Risks. For pre context, OWASP (The Open WorldWide Application Security Project) is a nonprofit foundation that is aimed at improving the security of Softwares. Broken Object Level Authorization- APIs tend to expos...DiscussAPIs
Raghava Ankireddypalleraghav0617.hashnode.dev·Jan 10, 2024Multi-Stage DevSecOps CI-CD ProjectPrerequisites: Ubuntu (20.02) instance with a minimum of 2 CPU, 16 GB of RAM and 30 GB of storageRequired ports: 8080 for Jenkins9000 for SonarQube 3000 for Docker container deployment 465 for SMTP (Simple Mail Transfer Protocol)Required Jenkins Plug...Discuss·7 likes·762 readsDevops
Azeezat Adebolazeecode.hashnode.dev·Jan 6, 2024Securing Web Applications: Identifying and Mitigating Common VulnerabilitiesIn today's digital world, web applications have become an important part of our lives, facilitating online banking systems, e-commerce platforms, social media networks, and many other services we use daily. However, the rise of web applications has a...Discuss·3 likes·27 readsWeb Development
Zen Chanz3n.hashnode.dev·Dec 30, 2023“Not All Those Who Commit to Code Are Lost”: A Developer’s Guide to Securing Container with OWASP 🧝♂️Safeguarding Your Digital Realms with OWASP’s Arcane Security Practices 🛡️🌟(Along with Gandalf the Grey🧙♂️) In every developer’s saga, genuine might lies in their unwavering commitment to mastering the arcane security practices bestowed by OWASP,...DiscussLord of the ring
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 20, 2023Basic pen-testing vulnhub machine 2 HackingBy Prabhudarshan Samal This article is about a well-illustrated write-up based on hacking activities in an educational temperament and non-abusive intent. The techniques and resources provided by the article are totally intended for educational purpo...Discusspentesting
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 17, 2023Cross-site scripting(XSS) RemediationApplications of cross-site scripting:- An attacker that uses a cross-site scripting flaw can usually do the following: Assume the identity of the victim user. Execute every action that the user is capable of. Read any data that the user has permissio...DiscussWAPT