Vaishali Rawatmaveraw.hashnode.dev·Feb 4, 2025SBOM: The Key to Secure Software Supply ChainsIntroduction With the rise of supply chain attacks, ensuring software security has become more critical than ever. One of the most effective ways to achieve this is through a Software Bill of Materials (SBOM). An SBOM provides a comprehensive invento...#cybersecurity
Vaishali Rawatmaveraw.hashnode.dev·Feb 4, 2025Common Security Pitfalls in Open-Source Development & How to Avoid ThemIntroduction Open-source software (OSS) is the backbone of modern development, but it also introduces security risks if not managed properly. Developers often overlook crucial security best practices, leading to vulnerabilities that can be exploited....#OpenSourceSecurity
Vaishali Rawatmaveraw.hashnode.dev·Feb 3, 202510 Secure Coding Practices Every Developer Must FollowSecurity should be a top priority for every developer, regardless of the project size or industry. With cyber threats evolving daily, secure coding practices are essential to prevent vulnerabilities that attackers can exploit. Here are 10 secure codi... #SecureDevelopment
Rao Waqas Akramraowaqasakram.hashnode.dev·Jan 13, 2025Timing is Everything in Cybersecurity: The Battle for First-Mover AdvantageIn the world of tech and cybersecurity, timing is often the most critical factor in determining whether a system remains secure or falls victim to an attack. The question of who learns about vulnerabilities first—defenders or attackers—can shape the ...33 reads#cybersecurity
Sakshi from KushoAIsoftware-deep-dives.hashnode.dev·Dec 4, 2024Modern Security Vulnerabilities: Lessons from Recent BreachesThis blog is written by Jeremy Rivera at KushoAI. We're building the fastest way to test your APIs. It's completely free and you can sign up here. In recent years, big tech has witnessed a series of high-profile security incidents that serve as cruci...#cybersecurity
Kuldeep YadavforBreachForcebreachforce.net·Oct 17, 2024Secure Your Node.js Applications: Top 10 Critical Vulnerabilities to Identify and Prevent Major ThreatsHave you ever had one of those moments when you feel confident about the code you’ve written — until a VAPT (Vulnerability Assessment and Penetration Testing) team reviews it? Suddenly you’re faced with a sea of red flags and dire warnings. Words lik...162 readsNode.js
Okoye Ndidiamakaamikdigital.hashnode.dev·Oct 14, 2024Secure Coding Practices to Protect Your Code in the Digital EraIn a world where cyber threats are continuously evolving, secure coding practices have become very significant. Writing secure code is something that every developer-from small project freelancers to enterprise-scale application developers-needs to f...Web Development
Nysa Guptanysaa.hashnode.dev·Oct 13, 2024OSINT: The Digital Detective Work You Didn’t Know You Were DoingSearching for someone online can uncover a surprising amount of information, whether you’re curious about a potential employer, a friend’s mysterious new acquaintance, or even your own digital footprint. Open Source Intelligence (OSINT) is exactly wh...17 likescybersecurity
Okoye Ndidiamakaamikdigital.hashnode.dev·Oct 13, 2024Cross-Site Scripting and CSRF: Secure Your Web Application against Common AttacksThe internet revolutionized our life, communication, and business, but this transformation is accompanied by security threats that grow. Among the most prevalent types of attacks that a web developer or any organization wants to safeguard against inc...XSSprevention
Chama JennaneforfreeCodeCampfreecodecamp.org·Oct 9, 2024How to Strengthen Your Code: Essential Secure Design Principles for DevelopersSecure design principles have long been the foundation for building secure systems. And they remain a crucial aspect of modern cybersecurity. Introduced in 1975 by Saltzer and Schroeder in their landmark paper The Protection of Information in Compute...secure coding