sansquarestarlog.sansquare.in·Apr 28, 2024Security Benefits of Transparency and Collaboration in Open Source SystemsOpen Source Security: Embracing Transparency and Collaboration The software development landscape is in a constant state of flux, and the widespread adoption of open-source software has been a major driving force. With its freely available and modifi...DiscussTech Insightsopen source security
Yarelys Riveracyberyara.com·Apr 5, 2024Safeguard Your Code: 6 Basic Vulnerabilities to Avoid and Tips to Improve Your Code SecurityIn the coding world, even the smallest oversight can pave the way for security vulnerabilities, leaving your application susceptible to exploitation by malicious actors. Cybersecurity incidents are rising and will continue as long as there is vulnera...Discusscode security
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Apr 3, 2024A Deep Dive Understanding of Smart Contract Vulnerabilities - Part 2Logic bugs in lending protocols When considering how lending and borrowing-based DeFi protocols can break, it's helpful to think about how bugs propagate at the software level and affect the business logic level. There are a lot of steps to forming a...DiscussWeb3
Aditya Ladadityaladblog.hashnode.dev·Feb 27, 2024SQL injection attackIntroduction:- It involves inserting SQL Queries through user input to manipulate the database. Successful exploitation can result in: Reading sensitive data from the database. Modifying database entries through insert, update, or delete operati...Discuss·10 likes·31 reads#sqlinjection
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Feb 12, 20242FA Security IssuesWhat is 2FA Two-factor authentication (2FA) is a specific type of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also referred to as authentication factors) to verify your identity. These factors can incl...Discuss·196 readsDevSecOps
Muhdsodiq Bolarinwaamityclev.hashnode.dev·Jan 12, 2024Common Security Vulnerabilities in Blockchain Systems and Strategies To Mitigate Them.Blockchain is a decentralized ecosystem, which is built to secure vital information. With the security of blockchain, there are still some security vulnerabilities that people are still building solutions on. These security vulnerabilities are weakne...Discussvulnerabilities
Dixon Gunasekaradixon.hashnode.dev·Dec 29, 2023Ways to Detect Application Security VulnerabilitiesThe security testing has been a very important thing in the application development because security vulnerabilities may damage an entire application and the entire reputation of an organization, putting organizations at risk for potential security b...Discusssecurity testing
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 20, 2023Basic pen-testing vulnhub machine 2 HackingBy Prabhudarshan Samal This article is about a well-illustrated write-up based on hacking activities in an educational temperament and non-abusive intent. The techniques and resources provided by the article are totally intended for educational purpo...Discusspentesting
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Nov 28, 2023An In-Depth Analysis of Google Chrome Extension Vulnerabilities and Securityhttps://tutorialboy24.blogspot.com/2023/11/an-in-depth-analysis-of-google-chrome.html Introduction Create a directory that has automatically synced and beautified the source code of Google Chrome extensions hosted in the Chrome Web Store. Search f...DiscussGoogle Chrome
Haneunhanlee.hashnode.dev·Oct 24, 2023Cybersecurity: What is Automated Attacks?Definition Automated attacks refer to vulnerabilities where attackers use computer programs or scripts to automatically target a system. Vulnerability Points Login page Post submission Social media sharing page Vulnerability Verification Methods...DiscussCyber Security#cybersecurity