Rao Waqas Akramraowaqasakram.hashnode.dev·Jan 13, 2025Timing is Everything in Cybersecurity: The Battle for First-Mover AdvantageIn the world of tech and cybersecurity, timing is often the most critical factor in determining whether a system remains secure or falls victim to an attack. The question of who learns about vulnerabilities first—defenders or attackers—can shape the ...#cybersecurity
Sakshi from KushoAIsoftware-deep-dives.hashnode.dev·Dec 4, 2024Modern Security Vulnerabilities: Lessons from Recent BreachesThis blog is written by Jeremy Rivera at KushoAI. We're building the fastest way to test your APIs. It's completely free and you can sign up here. In recent years, big tech has witnessed a series of high-profile security incidents that serve as cruci...#cybersecurity
Kuldeep YadavforBreachForcebreachforce.net·Oct 17, 2024Secure Your Node.js Applications: Top 10 Critical Vulnerabilities to Identify and Prevent Major ThreatsHave you ever had one of those moments when you feel confident about the code you’ve written — until a VAPT (Vulnerability Assessment and Penetration Testing) team reviews it? Suddenly you’re faced with a sea of red flags and dire warnings. Words lik...149 readsNode.js
Okoye Ndidiamakaamikdigital.hashnode.dev·Oct 14, 2024Secure Coding Practices to Protect Your Code in the Digital EraIn a world where cyber threats are continuously evolving, secure coding practices have become very significant. Writing secure code is something that every developer-from small project freelancers to enterprise-scale application developers-needs to f...Web Development
Nysa Guptanysaa.hashnode.dev·Oct 13, 2024OSINT: The Digital Detective Work You Didn’t Know You Were DoingSearching for someone online can uncover a surprising amount of information, whether you’re curious about a potential employer, a friend’s mysterious new acquaintance, or even your own digital footprint. Open Source Intelligence (OSINT) is exactly wh...16 likescybersecurity
Okoye Ndidiamakaamikdigital.hashnode.dev·Oct 13, 2024Cross-Site Scripting and CSRF: Secure Your Web Application against Common AttacksThe internet revolutionized our life, communication, and business, but this transformation is accompanied by security threats that grow. Among the most prevalent types of attacks that a web developer or any organization wants to safeguard against inc...XSSprevention
Chama JennaneforfreeCodeCampfreecodecamp.org·Oct 9, 2024How to Strengthen Your Code: Essential Secure Design Principles for DevelopersSecure design principles have long been the foundation for building secure systems. And they remain a crucial aspect of modern cybersecurity. Introduced in 1975 by Saltzer and Schroeder in their landmark paper The Protection of Information in Compute...secure coding
Nikita Sarkanianikitasarkania.hashnode.dev·Oct 2, 2024Security Risks of Inline Event Handlers in React.js (And How to Avoid Them)If you’re a React.js developer, chances are you’ve dropped an inline event handler into your code without even thinking twice. It’s so easy to do! You might write something like this: <button onClick={() => alert('You clicked me!')}>Click Me</button>...84 readsReactSecurity
Manish DipankarforGirmantech Blogblog.girmantech.com·Sep 27, 2024Role Based Access ControlAt Girmantech, we partner with numerous clients across diverse industries, and one challenge we consistently encounter is the need for robust and flexible systems like Role-Based Access Control (RBAC). Whether it's managing complex user permissions, ...46 readsgranular rbac
Gyuhang Shimplto001.hashnode.dev·Sep 16, 2024Soundness of Programming LanguagesSoundness and Completeness at the Programming Language Level Soundness in programming languages is a concept that represents the stability and reliability of a language's type system. In other words, if a language's type system can catch all type-rel...soundness-and-completeness