Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Oct 9, 2024Comprehensive Guide to Brute Force Attacks: Examples, Detection, and Prevention TacticsIn the realm of cybersecurity, Brute Force Attacks stand as one of the most fundamental and common threats. Despite their simplicity, they can be incredibly dangerous if left unchecked. This blog explores what a brute force attack is, presents a real...DiscussFortify and Defend: Navigating the Cybersecurity Landscapebruteforcing
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Sep 25, 2024Open Redirection Attacks: Comprehensive Analysis with Practical CasesIn the world of web application security, Open Redirection Attacks often go unnoticed but pose significant threats if left unchecked. These attacks can be exploited by malicious actors to redirect unsuspecting users to untrusted or malicious websites...DiscussFortify and Defend: Navigating the Cybersecurity Landscapeopen redirection
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Sep 17, 2024LFI and RFI: A Deep Dive with Real-World ExamplesLFI (Local File Inclusion) and RFI (Remote File Inclusion) are two common web application vulnerabilities that allow attackers to include files on the server, potentially leading to unauthorized access, code execution, or data disclosure. LFI (Local ...Discuss·75 readsFortify and Defend: Navigating the Cybersecurity Landscapecode security
Esther Okaforestherokafor.com·Sep 11, 2024Strengthening API Security: A QA Engineer's Guide to the OWASP Top 10APIs are everywhere. They're the silent workhorses powering your favourite apps, from ordering food to streaming movies and so much more. But with great power comes great responsibility. And in the world of software, that responsibility falls partly ...Discuss·29 readsapi security
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Sep 5, 2024Insecure Direct Object Reference (IDOR) Attacks Explained: Comprehensive GuideInsecure Direct Object Reference (IDOR) is a common web application security flaw that occurs when an application exposes references to internal objects like files, database entries, or user records, which should not be accessible by unauthorized use...DiscussFortify and Defend: Navigating the Cybersecurity Landscape#cybersecurity
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Aug 28, 2024Command Injection Attacks: A Critical Cybersecurity ThreatIn the realm of cybersecurity, command injection attacks stand out as one of the most potent and dangerous forms of attack. These attacks exploit vulnerabilities in applications to execute arbitrary commands on a server, leading to potential system c...Discuss·1 likeFortify and Defend: Navigating the Cybersecurity LandscapeWeb Security
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Aug 21, 2024Understanding Cross-Site Scripting (XSS) Attacks: What You Need to KnowCross-Site Scripting (XSS) is one of the most common and dangerous security vulnerabilities affecting web applications today. Despite being well-known, XSS continues to be a significant threat, impacting websites and users across the globe. In this b...DiscussFortify and Defend: Navigating the Cybersecurity Landscapewebsecurity
Elom Emmanuelscansio.hashnode.dev·Jul 24, 2024Mastering OWASP Top 10: Transform Your Security Analyzer into a Code Auditing PowerhouseAbsolutely! Let's spice things up with some OWASP-flavored security auditing. We'll expand our code to cover some of the OWASP Top 10 vulnerabilities. Buckle up, because we're about to turn our security analyzer into the Swiss Army knife of code audi...DiscussOWASP TOP 10
Nipun Hegdecodecloudcapital.hashnode.dev·Jul 19, 2024Tackling OWASP Top 10 Vulnerabilities in Java Spring frameworkIn the realm of web application security, the OWASP (Open Web Application Security Project) Top 10 list is a crucial resource. It identifies the most critical security risks to web applications. Understanding these vulnerabilities and knowing how to ...Discuss·35 readsSpringboot
Nipun Hegdecodecloudcapital.hashnode.dev·Jul 19, 2024What is OWASP Top 10: History, Importance, and Detailed AnalysisIntroduction In the ever-evolving landscape of web security, the OWASP (Open Web Application Security Project) Top 10 has become an essential resource for developers and security professionals. This list identifies the most critical security risks to...DiscussOWASP TOP 10