© 2023 Hashnode
#security
Greetings web3 explorers! Are you ready to embark on a thrilling expedition into the realm of Webacy? Get ready to strap on your digital armor, for we are about to talk through the most captivating gu…
Why a separate guide on this? AWS offers the option to generate permissions based on Cloudtrail logs. That's great for management events, however it doesn't work well for data events. But why? AWS' policy generation gives you nothing: And…
In an increasingly interconnected digital landscape, securing web applications is paramount. React, a popular JavaScript library for building user interfaces is not immune to security vulnerabilities.…
This is Part 2 of my previous article: Decoding DNS — Understanding and Troubleshooting DNS Fundamentals. It dives head first into the fundamentals of DNS and how it serves as a critical system for na…
In today's digital landscape, where data privacy is of paramount importance, end-to-end encryption (E2EE) has emerged as a crucial technology. E2EE ensures that only the intended recipients can access…
Introduction Kubernetes is a container orchestration platform highly valued for its flexibility and scalability. However, with the increase in popularity of Kubernetes, the threats to security are als…
Introduction Kubernetes is widely used to deploy, scale and manage containerized applications. In order to run these containerized applications securely, Kubernetes provides us with a tool known as Se…
The Offensive Security Certified Professional (OSCP) certification is widely regarded as one of the most challenging and respected certifications in the cybersecurity field. To pass the OSCP exam, it'…
Azure Firewall is a cloud service under the Azure security umbrella that allows customers to centrally manage all their network traffic with built-in capabilities, including high capability, scalabili…
Authentication flow is a fundamental part of web applications. It ensures the security and privacy of user data while they are using your app. While there are many off-the-shelf authentication solutio…