Kuldeep YadavforBreachForcebreachforce.net·Oct 17, 2024Secure Your Node.js Applications: Top 10 Critical Vulnerabilities to Identify and Prevent Major ThreatsHave you ever had one of those moments when you feel confident about the code you’ve written — until a VAPT (Vulnerability Assessment and Penetration Testing) team reviews it? Suddenly you’re faced with a sea of red flags and dire warnings. Words lik...Discuss·110 readsNode.js
Okoye Ndidiamakaamikdigital.hashnode.dev·Oct 14, 2024Secure Coding Practices to Protect Your Code in the Digital EraIn a world where cyber threats are continuously evolving, secure coding practices have become very significant. Writing secure code is something that every developer-from small project freelancers to enterprise-scale application developers-needs to f...DiscussWeb Development
Nysa Guptanysaa.hashnode.dev·Oct 13, 2024OSINT: The Digital Detective Work You Didn’t Know You Were DoingSearching for someone online can uncover a surprising amount of information, whether you’re curious about a potential employer, a friend’s mysterious new acquaintance, or even your own digital footprint. Open Source Intelligence (OSINT) is exactly wh...Discuss·16 likescybersecurity
Okoye Ndidiamakaamikdigital.hashnode.dev·Oct 13, 2024Cross-Site Scripting and CSRF: Secure Your Web Application against Common AttacksThe internet revolutionized our life, communication, and business, but this transformation is accompanied by security threats that grow. Among the most prevalent types of attacks that a web developer or any organization wants to safeguard against inc...DiscussXSSprevention
Chama JennaneforfreeCodeCampfreecodecamp.org·Oct 9, 2024How to Strengthen Your Code: Essential Secure Design Principles for DevelopersSecure design principles have long been the foundation for building secure systems. And they remain a crucial aspect of modern cybersecurity. Introduced in 1975 by Saltzer and Schroeder in their landmark paper The Protection of Information in Compute...Discusssecure coding
Nikita Sarkanianikitasarkania.hashnode.dev·Oct 2, 2024Security Risks of Inline Event Handlers in React.js (And How to Avoid Them)If you’re a React.js developer, chances are you’ve dropped an inline event handler into your code without even thinking twice. It’s so easy to do! You might write something like this: <button onClick={() => alert('You clicked me!')}>Click Me</button>...Discuss·84 readsReactSecurity
Manish DipankarforGirmantech Blogblog.girmantech.com·Sep 27, 2024Role Based Access ControlAt Girmantech, we partner with numerous clients across diverse industries, and one challenge we consistently encounter is the need for robust and flexible systems like Role-Based Access Control (RBAC). Whether it's managing complex user permissions, ...Discuss·37 readsgranular rbac
Gyuhang Shimplto001.hashnode.dev·Sep 16, 2024Soundness of Programming LanguagesSoundness and Completeness at the Programming Language Level Soundness in programming languages is a concept that represents the stability and reliability of a language's type system. In other words, if a language's type system can catch all type-rel...Discusssoundness-and-completeness
Josep Projohomo.hashnode.dev·Aug 7, 2024Choosing the Right Dependencies: Ensuring Quality and Security in your Software ProjectsBuilding a project from scratch is rare due to the complexity and time constraints involved. Instead, developers often build applications on top of existing software. This means our software depends on other software. Dependencies are necessary and u...Discuss·26 readsDeveloper Career Growthopenssf scorecard
Md Faizan Alamsololearner.hashnode.dev·Jul 28, 2024What Is Secure Coding?Imagine building a house without a sturdy foundation or reliable locks on the doors. It might look impressive from the outside, but inside, it’s vulnerable to collapse and break-ins. Secure coding is akin to constructing that solid foundation and ins...Discusssecure coding