Lilian Cariourasengansec.hashnode.dev·Dec 19, 2024Invariant Testing : From 0 to HeroInvariant testing as kind of super-fuzzing Fuzz Test = many randomly generated values and verify assertion Invariant test : apply same idea but to the system as a whole, during an invariant test, the fuzzer run again all functions in all contracts ...echidna
Vijayashree Shindevijayashree44.hashnode.dev·Dec 19, 2024A Complete Guide to Testing Web Applications for Security VulnerabilitiesCybercriminals are increasingly targeting web applications, making their security more critical than ever. 43% of all data breaches in 2021 were linked to vulnerabilities in web applications, according to the Verizon Data Breach Investigations Report...penetration testing
Vijay Guptaai-ml-data-science-bootcamp-insights.hashnode.dev·Dec 15, 2024vulnerability Management TheoryOne common question you will hear in interviews, can you define a vulnerability, risk, and threat? A vulnerability is a weakness in software that can be exploited, we know that. But a vulnerability is insignificant without a corresponding threat. A t...Security
Brahmanoob6t5.hashnode.dev·Dec 11, 2024Boost Your Hunting with extract_OAuTHIdea and Insp: It was a late night. My inbox was lighting up with Invitation for developing Fuzzer’s and tool’s for my client’s , but I kept skipping over them. Something was missing. I wanted something faster and something smarter for my client’s th...1 like·47 readsautomation
Abhayabhayit2000.hashnode.dev·Dec 10, 2024Biometrics and 2FA Authentication: A Detailed Analysis of Security ApproachesAuthentication is pivotal in safeguarding security, working in tandem with encryption and physical safeguards. However, traditional methods like passwords must still address modern mobile security challenges. This shortfall has spurred the widespread...security testing
Harendra Barotharrybdevops.hashnode.dev·Nov 28, 2024Securely Managing Sensitive Information with HashiCorp Vault and Terraform 🔐What’s Covered in This Blog Challenges in managing sensitive information in Terraform configurations. An approach to integrating HashiCorp Vault with Terraform for secure management. Step-by-step guide for securely using secrets with Terraform usi...13 likes·98 readsDevops
pallavi chauhaninnovateitworld.hashnode.dev·Nov 14, 2024The Software Tester’s Toolkit: Must-Have Skills and Tools for 2024With software testing advancing rapidly, a tester's toolkit must be equipped with up-to-date skills and technologies to keep pace. As new frameworks, automation tools, and methodologies emerge, testers need to stay adaptable and well-informed. This b...Analytical Skills
Victor Uzoagbavictoru.hashnode.dev·Oct 25, 2024Security Best Practices for SaaS Applications: End-User GuidelinesIn today's digital landscape, security isn't just an IT department's responsibility—it's everyone's concern. As organizations increasingly rely on SaaS (Software as a Service) applications, understanding and implementing proper security measures has ...securityawareness
Victor Uzoagbacyberfriend.hashnode.dev·Oct 23, 2024Zero Trust Architecture: Advantages and Challenges in ImplementationIntroduction As changes are taking place regarding the digital platform, conventional security models cannot cope with the threats that prevail today. Perimeter-based security relies primarily on the proposition that threats from outside an organizat...securityawareness
Victor Uzoagbacyberfriend.hashnode.dev·Oct 22, 2024Quantum Computing's Impact on Current Encryption MethodsIntroduction Quantum computing is a wonder of modern times, still in the embryonic stage of development and assurance of computation speed unparalleled by classical computers. While this may open new avenues, it is also one of the most dangerous tech...encryption