Yogendra Porwalqasimple.hashnode.dev·Jul 25, 2024Integrating OWASP ZAP Scans into Selenium TestsIn today's web-driven world, robust web application security is an absolute necessity. Even minor vulnerabilities can have catastrophic consequences, leading to data breaches, financial losses, and reputational damage.Consider a crypto trading platfo...DiscussSecuritytools and tip
Sergio Medeirosgrumpz.net·May 21, 2024CVE-2024-34240: Latest Stored XSS 0day Vulnerability UnveiledLate in the evening, I decided to explore some PHP applications focused on Student Information Systems, inspired by my recent success in finding systemic stored XSS vulnerabilities in a private bug bounty program. I visited my favorite source for PHP...Discuss·11 likes·600 readsMy Security ResearchBugs and Errors
Teddy Okaforblog.mockapi.com·May 5, 2024Security Testing with MockAPI: Best Practices and TipsIn the era of digital transformation, security is paramount. Every new feature and API introduces potential vulnerabilities into your system, making rigorous security testing essential. MockAPI offers a powerful solution for conducting thorough secur...DiscussAPIs
Prajoti Raneprajotirane.hashnode.dev·Apr 26, 2024LinkedIn Data Breach: Analyzing the 2012 breach resulting in stolen user credentials.Technical Analysis of the 2012 LinkedIn Data Breach: Decrypting the Theft of User Credentials The 2012 LinkedIn data breach remains one of the most notable incidents in cybersecurity history, involving the compromise of millions of user credentials....DiscussBlogging
Prajoti Raneprajotirane.hashnode.dev·Apr 6, 2024Target Data Breach: A Case Study in Cybersecurity Failures and Lessons LearnedIn the annals of cybersecurity breaches, few incidents have had the lasting impact and repercussions as the Target data breach of 2013. This watershed moment not only exposed the vulnerabilities of one of America's largest retailers but also served a...DiscussTarget data breach, cybersecurity failures, cyber attack timeline, technical details of breach, breach mitigation strategies, security measures, lessons learned from breach
Kaustubh RaiforBreachForcebreachforce.net·Mar 9, 2024Streamlining Security Assessments with BChecksAll of us - security professionals - use Burp Suite every day, whether as red teamers or blue teamers. With our experience in the industry, we've encountered scenarios where we'd like to remember specific test cases for particular categories. We ofte...Discuss·10 likes·80 readsbchecks
Yogendra Porwalqasimple.hashnode.dev·Mar 5, 2024Empowering Api Security Testing With Pynt And PytestIn today's API-driven landscape, robust security testing is paramount. Pynt, a powerful API security testing tool, seamlessly integrates with pytest, the popular Python testing framework, streamlining your workflow and enhancing test coverage. This a...DiscussSecurity
Stellar Cyberstellarcyber.hashnode.dev·Feb 15, 2024Leverage the tools and telemetry you trustThe industry is at a pivotal point. With the pandemic driving up work-from-home and forcing hybrid work environments as well as many applications moving to the cloud, cybersecurity professionals are challenging best practices and once-thought foundat...Discusssecurity testing
Stellar Cyberstellarcyber.hashnode.dev·Feb 14, 2024A Security Discussion Around SunburstWhat was the sunburst attack and how can MSPs protect themselves against in the future? That’s what we’ll be discussing in today’s episode. Episode Highlights: What is sunburst? Can it be protected against? Would a SIEM guard against this? What i...Discusssecurity testing
Malavikaviksmals.hashnode.dev·Feb 11, 2024Running Vulnerability Scans for Spark Third Party PackagesIf you use Spark in your codebase, chances are you also use some popular third-party packages to work with Spark. What does this mean from a security perspective? Your application may have some security vulnerabilities introduced due to these third-p...DiscussSpark For Data Science