Rishi BakshiforRishi Bakshi Blogrishibakshi.hashnode.dev·Sep 10, 2024Understanding use server and Avoiding Data Leaks in Next.jsOne of the common misconceptions in Next.js is the belief that adding the use server directive to a component will automatically turn it into a server component. However, this isn't accurate. The use server directive is used to create server actions,...DiscussYou Don't Know Next.jsdata-access-layer
Keshav AgrawalforSecopsbytesecopsbyte.com·Aug 15, 2024Weekly CVE AdvisoryAs we navigate through the evolving landscape of cybersecurity threats, this week's advisory highlights four critical CVE and a notable research finding from recent security updates. This information aims to help organizations prioritize their patchi...DiscussWeekly CVE Advisorylatest vulnerability
Magda Jankowskamagdajankowska.hashnode.dev·Jun 23, 2024Common Vulnerabilities in Smart Contracts1. Understand Common Vulnerabilities Reentrancy Attacks Description: An attacker repeatedly calls a contract before the previous execution is finished, often exploiting external calls. Mitigation: Use the Checks-Effects-Interactions pattern. Always...DiscussSmart Contracts
sansquarestarlog.sansquare.in·Apr 28, 2024Security Benefits of Transparency and Collaboration in Open Source SystemsOpen Source Security: Embracing Transparency and Collaboration The software development landscape is in a constant state of flux, and the widespread adoption of open-source software has been a major driving force. With its freely available and modifi...DiscussTech Insightsopen source security
Yarelys Riveracyberyara.com·Apr 5, 2024Safeguard Your Code: 6 Basic Vulnerabilities to Avoid and Tips to Improve Your Code SecurityIn the coding world, even the smallest oversight can pave the way for security vulnerabilities, leaving your application susceptible to exploitation by malicious actors. Cybersecurity incidents are rising and will continue as long as there is vulnera...Discusscode security
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Apr 3, 2024A Deep Dive Understanding of Smart Contract Vulnerabilities - Part 2Logic bugs in lending protocols When considering how lending and borrowing-based DeFi protocols can break, it's helpful to think about how bugs propagate at the software level and affect the business logic level. There are a lot of steps to forming a...DiscussWeb3
Aditya Ladadityaladblog.hashnode.dev·Feb 27, 2024SQL injection attackIntroduction:- It involves inserting SQL Queries through user input to manipulate the database. Successful exploitation can result in: Reading sensitive data from the database. Modifying database entries through insert, update, or delete operati...Discuss·10 likes·31 reads#sqlinjection
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Feb 12, 20242FA Security IssuesWhat is 2FA Two-factor authentication (2FA) is a specific type of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also referred to as authentication factors) to verify your identity. These factors can incl...Discuss·271 readsDevSecOps
Ronald Bartelshubandspoke.amastelek.com·Jan 30, 2024🔒Safeguarding Sensitive Data | Mitigating API Vulnerabilities in Application Servers 💪In today's data-driven landscape, the efficient exchange of information between applications is pivotal. However, this interconnectedness presents an Achilles' heel—poorly secured Application Programming Interfaces (APIs) on servers, often serving as...DiscussAPIs
Muhdsodiq Bolarinwaamityclev.hashnode.dev·Jan 12, 2024Common Security Vulnerabilities in Blockchain Systems and Strategies To Mitigate Them.Blockchain is a decentralized ecosystem, which is built to secure vital information. With the security of blockchain, there are still some security vulnerabilities that people are still building solutions on. These security vulnerabilities are weakne...Discussvulnerabilities