Panagiotis Vasilikossecuringbits.com·Sep 6, 2023HTTP Response Headers: Usage and Security AbuseHTTP Response Headers: Usage 🛠 and Security Abuse ☠. Those complement the HTTP Request Headers we saw last week :)Discusswebsecurity
rafna bashrafna.hashnode.dev·Sep 1, 2023Access control in web applicationsMy last article was about the importance of web security in small applications and how to ensure security practices in those applications. So I thought to continue the conversation on the same topic. This article is about various challenges with prev...Discusswebsecurity
Aanchalaanchalfatwani.hashnode.dev·Aug 31, 2023What is Cross-Site Scripting?Cross-site scripting (XSS) is a type of injection attack where malicious scripts are injected into otherwise benign and trusted websites. These scripts are then executed by other users' browsers when they visit the website, allowing the attacker to a...DiscussXSS
Panagiotis Vasilikossecuringbits.com·Aug 30, 2023HTTP Request Headers: Usage and Security AbuseDiscussbugbounty
Cynthia Ilojemecynthiailojeme.hashnode.dev·Aug 24, 2023Safeguarding Your Web Applications Against Cross-Site Scripting (XSS) VulnerabilitiesA brief intro on web security Web security, also known as "Cybersecurity," is the practice of safeguarding websites and web applications by detecting, preventing, and responding to cyber threats. The goal of web security is to protect against hackers...Discuss·9 likes·51 readsFrontend Development
Cxnsxlecxnsxle.hashnode.dev·Aug 23, 2023API Abuse VulnerabilityWhat is API Abuse? API abuse refers to the act of wrong-handling of APIs, gaining unsanctioned access, and modifying the key functions so that APIs can be used for adversarial processes like raiding a server or overburdening a server. It’s performed ...Discuss·1 likeAPIs
Pranav ShikarpurforPangea Blogpangeacyber.hashnode.dev·Aug 17, 2023Light Sabers Unleashed: The Lazy Developer's Guide to Outsmarting BotnetsCover Image Credit: cc 2.0 www.flickr.com/photos/dwmoran/21548629573/ In a galaxy far, far away starships sail through the vast expanse of the universe and struggle against dark forces. In that galaxy, the noble bot C-3PO brings order and harmony, w...Discuss·80 reads#cybersecurity
Haneunhanlee.hashnode.dev·Aug 16, 2023Web Hacking Practice: Session Fixation AttackLogin Screen Login Attempt Request Login Complete The above website issues a session before login and verifies the ID and password received during the login attempt request. In other words, the website follows this flow: Issuing a session ID (unau...DiscussCyber Securitycybersecurity
Vinit Guptathevinitgupta.hashnode.dev·Aug 12, 2023API Gateway - The Gatekeepers of BackendIn the realm of modern software development, APIs (Application Programming Interfaces) are the backbone of seamless communication between various services. At the core of this interaction lies the API Gateway, which sits in between the client and bac...Discuss100 Days of Learning APIs
hexbyteblog.hexbyte.in·Aug 9, 2023Automated Market Makers (AMMs) & more...Until Now, The exchange markets worked on a trade execution model called "CLOB" or the Central Limit Book Order. This model is transparent but slow and requires a middleman. The middleman (in our case, the exchanges / derivative / equity markets) mat...Discuss·26 readsWeb3