Mainul Hasanhashnode.mmainulhasan.com·Apr 7, 2024A Guide to Common Web Application Security Vulnerabilities and MitigationIn today’s digital age, web applications have become central to the operations of businesses across the globe. At the same time, these applications offer unprecedented convenience and functionality but pose significant security risks. This blog post ...Discuss#sqlinjection
Balajibalajidevops.hashnode.dev·Mar 29, 2024Title: Exploring Prowler: A Comprehensive Guide to AWS Security and Compliance MonitoringIntroduction: In today's cloud-centric world, ensuring the security and compliance of AWS (Amazon Web Services) environments is paramount for organizations of all sizes. Prowler, an open-source security tool, has emerged as a powerful solution for au...Discuss·2 likes·54 readsAWS
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Mar 29, 2024A Deep Dive Understanding of Smart Contract Vulnerabilities - Part 1This article serves as a mini-course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend to recur in Solidity smart contracts. A security issue in Solidity boils down to smart contracts not behaving t...DiscussWeb3
Andreas RenzforEncryptoriumblog.encryptorium.com·Mar 28, 2024The Heartbleed Vulnerability: CVE-2014-0160The Heartbleed bug is one of the most significant security vulnerabilities that have impacted the internet, affecting millions of web servers and users' data security worldwide. Discovered in April 2014, Heartbleed was a severe flaw in OpenSSL, a wid...Discussheartbleed
Gaurav Chaudharypixelgig.pro·Mar 24, 2024Alert! GitHub Repositories Under Attack: How to Protect Your CodeThis week, the Wild West of code witnessed a digital dust-up! Over 100,000 repositories on GitHub, the popular code-sharing platform, were reportedly infected with malicious code. This incident serves as a stark reminder for all programmers to stay v...DiscussGitHub
Juraj Malenicajuraj.hashnode.dev·Mar 20, 2024Death to the invincible engineer“No vulnerability, no creativity. No tolerance for failure, no innovation. It is that simple. If you’re not willing to fail, you can’t innovate. If you’re not willing to build a vulnerable culture, you can’t create.”— Brené Brown, professor and autho...Discuss·36 likes·8.7K readsvulnerability
Anjalipeachycloudsecurity.hashnode.dev·Mar 13, 2024AWS Amazon Inspector: Vulnerability ManagementAmazon Inspector is a cloud native service for continuous scanning of Elastic Compute Cloud (EC2) and container workloads. It identifies software vulnerabilities and unintended network exposure which makes it a good vulnerability management service. ...DiscussAWS
Anshumansinghanshuman.hashnode.dev·Mar 10, 2024How Aikido helps in securing your Codebase!With a rise in multiple SaaS startups growing around the world, companies are in more need of solutions that can help them in making their systems secure. As a result, we have seen a good number of organizations emerging, which provide security testi...Discuss·21 likes·45 readsSAST
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Feb 24, 2024Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution VulnerabilityOverview This article explores a vulnerability discovered a few months ago in Google Chrome's V8 JavaScript engine. The vulnerability was fixed via a Chrome update on January 16, 2024, and was assigned the number CVE-2024-0517. The vulnerability aris...Discussvulnerability
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Feb 21, 2024Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)Recently, the Threat Research Unit of Qualys Company disclosed a Glibc vulnerability. The Glibc library has a buffer overflow vulnerability when processing environment variables, which can lead to local privilege escalation. This vulnerability affect...Discuss#cybersecurity