Jakubapertureless.hashnode.dev·a few seconds agoEnd-to-end encryption in the browser Part 1What a time to be alive. We are living in an era where AI is on the rise, huge data breaches occur on a weekly basis and ransomware is a daily threat. Each and every service and app requires us to provide tons of personal information, which quite oft...Discusswebdev
Derek Onwudiwetecheffect.hashnode.dev·4 hours agoDigital Privacy and SurveillancePrivacy in the Digital Age is a multifaceted issue with far-reaching implications. Here are some of the broader implications of digital privacy and surveillance, along with examples: Loss of Personal Privacy: Example: Social media platforms often col...Discussprivacy
Nebulanebulablogs.com·16 hours agoMy Experience Performing a Threat Model Review of an AWS Architecture PlanShortly after passing the AWS (Amazon Web Services) Developer Associate exam, I was tasked with conducting a security threat model review of a new microservice architecture design plan. The development team wanted to integrate existing Kubernetes clu...DiscussSecurity
Derek Onwudiwetecheffect.hashnode.dev·a day agoSafe file sharing practiceSome safe practices for sharing files online without compromising security: Use Secure Channels: Always share sensitive files through secure and encrypted channels. Email attachments may not be the safest option; consider using secure file-sharing se...Discuss#cybersecurity
Charles Ilocharlesik.hashnode.dev·Sep 26, 2023Web Application Security: Protecting the Organization and the UserWeb Application Security is the practice of protecting websites, applications and APIs from cyber attacks. Its primary aim is to protect web applications and their users from data theft, malware, phishing, denial-of-service (DoS) attacks and other co...DiscussWeb Development
Felipe Faragutifaraguti.hashnode.dev·Sep 26, 2023How to Change the Default SSH Port for UbuntuIntroduction SSH (Secure Shell) is a widely used protocol for secure remote access to Linux servers. By default, SSH uses port 22 for communication. While this is convenient, it also makes your server a prime target for hackers trying to gain unautho...Discussssh
Gabi DobocanforSandwormblog.sandworm.dev·Sep 25, 2023PHP & Composer Support Is Here! 🐘We're excited to announce Sandworm is adding support for PHP via the Composer package manager. Composer has over 300,000 packages available, covering a wide range of functionality. This includes packages for web development, APIs, microservices, data...Discuss·353 readsPHP
Team Optimizersteamoptimizers.hashnode.dev·Sep 25, 2023Envelope encryption in EKS 🔐Hola!! 🙋🏻♂️ 𝗧𝗼𝗽𝗶𝗰 — Security 🔐𝗦𝗲𝗿𝗶𝗲𝘀 — “Under the hood” ⛏ The Envelope encryption is a vital defense-in-depth security feature that has addressed a crucial need — the protection of secrets that would otherwise be stored in plain text f...DiscussKubernetes
K Srinivas Raosrini-dev.hashnode.dev·Sep 25, 2023Secure CSS in React Applications: A Comprehensive GuideIn the vast expanse of web development, the influential role of Cascading Style Sheets (CSS) is undeniable. Despite its pervasive use, potential security risks lurk in the shadows of CSS, often overlooked by developers. This comprehensive guide seeks...DiscussReact
V Sai Harshav-sai-harsha.hashnode.dev·Sep 24, 2023Security Vulnerabilities Developers Needed to KnowIntroduction In an era where digital interactions and data exchange are the lifeblood of our interconnected world, security vulnerabilities have taken center stage. The digital landscape is teeming with potential threats that exploit weaknesses in so...DiscussSecurity