Atharv Patilatharvpatil.hashnode.dev·May 9, 2024"The Silent Threat: Understanding and Preventing SQL injection"In the dynamic world of cybersecurity, one threat stands as a silent predator, capable of infiltrating systems and exfiltrating sensitive data with remarkable precision: SQL injection. As web applications continue to dominate our digital landscape, t...DiscussSQL
Mirza Mansoor Ali Baigmirza14.hashnode.dev·May 1, 2024Conquering the SANS GWAPT Exam: A Personal JourneyThis is my personal journey that I'm sharing on how I managed to pass the exam. I made sure to understand the exam objectives, sections, and sub-sections, and determine how many days I needed to prepare for the course and take the exam. I started pre...Discuss·33 readsgwapt
Michaelmichaelhabra.hashnode.dev·Apr 12, 2024Denial of Service Dos & Distributed Denial of Service DDosAn attacker can generate sufficient traffic to starve your server of resources, they can make deny service to legitimate users. Denial-of-service attacks are designed to make a site unavailable to regular users. In a DoS attack, a single computer or...Discussdos attack
Cloud Tunedcloudtuned.hashnode.dev·Apr 3, 2024Understanding the OWASP Top 10: Key Web Application Security RisksUnderstanding the OWASP Top 10: Key Web Application Security Risks The Open Web Application Security Project (OWASP) is a community-driven organization dedicated to improving the security of software. One of OWASP's flagship initiatives is the OWASP ...DiscussSecurity
Nikhil Pandeynikhilpandeydigital.hashnode.dev·Mar 15, 2024Decoding Security Debt: Differentiating It from Tech Debt and Ways to Tackle ItIn the fast-paced world of technological advancements, organizations often face the dilemma of balancing innovation with security. Tech debt and security debt are two terms commonly used in the realm of software development and cybersecurity. Underst...Discuss·10 likesSecurity debt
Shahi ShreshthforTechLearn Indiablog.techlearnindia.com·Mar 15, 2024Level Up Your Security Game: OWASP Top 10 is Your EndgameTurning Security Headaches into Creative Problem-Solving The digital world thrives on innovation, but with every new advancement comes a new set of security challenges. This is where the Open Web Application Security Project (OWASP) comes in, not jus...Discussavengers
Alice Githuialicegithui.hashnode.dev·Mar 12, 2024OWASP Top 10 2023The OWASP (Open Worldwide Application Security Project) Top 10 is a regularly released report that details the security risks for web application security, focusing on the top 10 security concerns. It aims to provide tools and resources to make web a...DiscussOWASP TOP 10
Nicolas FränkelforApache APISIXapisix.hashnode.dev·Feb 8, 2024Hardening Apache APISIX with the OWASP's Coraza and Core RulesetThe Open Worldwide Application Security Project is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security. The OWASP provid...Discuss·1 likeowasp
Ian Carsoniancarson.hashnode.dev·Jan 20, 2024OWASP Top 10 API Security Risks.Below are Top 10 OWASP API Security Risks. For pre context, OWASP (The Open WorldWide Application Security Project) is a nonprofit foundation that is aimed at improving the security of Softwares. Broken Object Level Authorization- APIs tend to expos...DiscussAPIs
Raghava Ankireddypalleraghav0617.hashnode.dev·Jan 10, 2024Multi-Stage DevSecOps CI-CD ProjectPrerequisites: Ubuntu (20.02) instance with a minimum of 2 CPU, 16 GB of RAM and 30 GB of storageRequired ports: 8080 for Jenkins9000 for SonarQube 3000 for Docker container deployment 465 for SMTP (Simple Mail Transfer Protocol)Required Jenkins Plug...Discuss·7 likes·804 readsDevops