Sarang Deshpandesarangcharthankar.hashnode.dev·4 hours agoThe Crucial Dance of Frontend and Backend Validations in Application SecurityIn the world of web development, data is king. It fuels our applications, allows for user interaction, and ultimately determines the success of our creations. But just like a king needs loyal guards to protect his castle, our data needs robust valida...Discussdevina
Mainul Hasanhashnode.mmainulhasan.com·Apr 7, 2024A Guide to Common Web Application Security Vulnerabilities and MitigationIn today’s digital age, web applications have become central to the operations of businesses across the globe. At the same time, these applications offer unprecedented convenience and functionality but pose significant security risks. This blog post ...Discuss#sqlinjection
Jeffrey Arukwejeffarukwe.hashnode.dev·Mar 25, 2024Protecting Your Project from NPM Dependency Confusion AttacksAs a developer, you’re likely familiar with the Node Package Manager (NPM), a powerful tool for managing dependencies in your JavaScript projects. However, a security vulnerability known as “dependency confusion” has highlighted the importance of bei...Discusscybersecurity
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Mar 22, 2024Secure Coding CheatsheetsIn today's interconnected digital landscape, security is paramount for developers across various platforms and programming languages. With cyber threats evolving rapidly, ensuring the security of software applications has become more critical than ev...Discuss·1.5K readsDevops
Glen Allenappandweb.hashnode.dev·Mar 11, 2024Best Practices for Flutter App SecurityI Introduction A. Brief overview of the importance of app security Mobile applications have become an integral part of our daily lives, handling sensitive user data and performing critical functions. Ensuring the security of these applications is cru...DiscussMobileAppSecurity,
Reza RashidiforRedTeamReciperedteamrecipe.com·Mar 8, 2024Java Applications Remote Code Execution ScenariosProcessBuilder Java code snippet contains a vulnerability that allows for Remote Code Execution (RCE) due to the lack of input validation/sanitization on the cmd parameter. Let's dive into a deep technical analysis of this vulnerability and how it ca...Discuss·534 readsJava
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Feb 26, 2024Defending APIswe embark on a journey to fortify our APIs against common vulnerabilities that lurk at every stage of the Software Development Lifecycle (SDLC). Drawing from insights gained through dissecting past breaches and understanding the ramifications of inse...Discuss·653 readsDevSecOps
Dave PoirierProblog.encoded.life·Jan 10, 2024Safely distributing API keys in your mobile appThe safest way is to keep your API keys server side. But if you have a library that's useable offline and it requires a license key to unlock, you will need a way to securely store that license key at runtime, without access to a server. Strap your h...Discuss·1 like·1.2K readsMobile SecurityiOS
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Nov 27, 2023OWASP Top 10 Mobile RisksImproper Credential Usage M1: Improper Credential Usage Threat Agents: Application Specific Threat agents exploiting this vulnerability include automated attacks using publicly available or custom-built tools. These agents can locate and exploit ha...Discuss·1.3K readsDevSecOps
Ankit Kumarkumarankit.hashnode.dev·Nov 15, 2023Using GitLab’s Secure File in GitLab CIGitLab is a powerful platform that provides a complete DevOps solution, including version control, continuous integration, continuous delivery, and security features. One of the essential components of a mobile app release automation pipeline is secu...Discuss·1 like·32 readsGitLab