Dharm Joshidharmjoshi.hashnode.dev·Sep 6, 2024FeaturedBuild End-to-End Authentication and Authorization system in NodeJSIntroduction In day-to-day terms using every application or website that requires some of your information to store and then allows you to have your account access using a combination of password and another identifier like your Email-Id or your user...Andrew Baisden and 2 others are discussing this3 people are discussing thisDiscuss·38 likes·444 readsNode.js
Abishek Kafledevops.abisec.xyz·7 hours agoHide Nginx Server Information for Better SecurityWhile deploying APIs on nginx server, we should be aware about future possible vulnerable cases. So better to prevent such possible vulnerability and threats on time. There are several cves published regularly. In case, attacker know our server info,...DiscussDevOpsnginx
bookmarx.devblog.bookmarx.dev·14 hours agoBookmarx | v1.5.1 Release NotesExport and Import Bookmarks The ability to export and import bookmarks (effectively backing them up manually) has now been added. We recommend regularly exporting your bookmarks in the event that you forget your password. How to Export Bookmark Data ...DiscussSecurity
Abigeal Afolabiarbythecoder.hashnode.dev·a day agoDay 28 - Secure Your Kubernetes Deployments: A Beginner's Guide to AnchoreHey there, container security is super important, especially when you're deploying your apps in Kubernetes. Anchore is a cool tool that helps you scan your container images before you launch them, making sure they're safe and sound. But here's the de...DiscussKubernetes
Hamza Mellahiblog.hmellahi.me·Sep 12, 2024Common Misconceptions About React Server ComponentsReact Server Components are a new way of writing React components that speed up server-side & full-stack app development. But let's be real, they've also caused a lot of confusion. Common Misconceptions 1. Client components are rendered only on the b...DiscussNext.js guide
Nicolás GeorgerforSREDevOps.orgsredevopsorg.hashnode.dev·Sep 12, 2024Vulnerabilidad crítica en un repo de Stripe: ¿Cómo asegurar los Workflows de GitHub Actions? Entendiendo "Pwn Request"Una vulnerabilidad grave en el GitHub Actions Workflow de Stripe permitió a un investigador obtener acceso al token de GitHub del repositorio. Esta vulnerabilidad, conocida como "Pwn Request", explotó la confianza depositada en los pull requests para...Discussapps
Nicolás GeorgerforSREDevOps.orgsredevopsorg.hashnode.dev·Sep 12, 2024Security Breach in Stripe GitHub's Repo: How to Secure GitHub Actions Workflows? Understanding the Pwn Request VulnerabilityA severe vulnerability in Stripe’s GitHub Actions Workflow allowed a researcher to gain access to the repository's GitHub token. This vulnerability, known as "Pwn Request," exploited the trust placed in pull requests to gain unauthorized access to se...Discussapps
Subhanshu Mohan Guptablogs.subhanshumg.com·Sep 11, 2024Achieving GDPR and CCPA Compliance with Automation and Encryption: Insights from Real Breach CasesIn today’s digital landscape, data breaches like the ones involving Facebook and Marriott have shown us the immense consequences of mishandling sensitive data. The General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) h...Discuss·10 likes·28 readsinfosec
Madzamadza.hashnode.dev·Sep 11, 2024How to Create a Secure Newsletter Subscription with NextJS, Supabase, Nodemailer and Arcjet 🔐💯In today's digital age, newsletters are a powerful tool for engaging with your audience, driving traffic, and building a loyal community around your brand. Enterprise options can be costly for large lists, while free solutions often face spam sign-up...Discuss·2 likes·215 readsWeb Development
Alberto Eusebialbeus.hashnode.dev·Sep 11, 2024Integrating Gitlab and Hashicorp Vault: A Complete OverviewHere is a clarification on how GitLab authenticates to HashiCorp Vault and how to set up a CI/CD pipeline to access secrets. You can find this information in the official Vault and GitLab guides. Since these details are scattered across various guide...DiscussGitLab
MeghOpsforMeghOpsblog.meghops.io·Sep 11, 2024Top 10 Cloud Security Challenges for SaaSSoftware as a Service (SaaS) has revolutionized the way businesses operate in the digital age. This cloud-based model allows companies to access software applications over the internet, eliminating the need for complex local installations and mainten...Discusscloud security