Cross-Site Request Forgery, Web Security, Session Attacks, Token Protection

From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
dev.toยท8hยท
Discuss: DEV
๐Ÿ’‰SQL Injection
Flag this post
HTB: Dump
0xdf.gitlab.ioยท16h
๐ŸฆˆWireshark
Flag this post
CORS and Same-Origin Policy Deep Dive
dev.toยท4hยท
Discuss: DEV
๐Ÿ”’TLS/SSL
Flag this post
Cache Poisoning: Making Your CDN Serve Malicious Content to Everyone ๐Ÿ—„๏ธ
instatunnel.myยท13hยท
Discuss: r/devops
๐Ÿ’‰SQL Injection
Flag this post
Implementing JWT Authentication in Rust using Axum
dev.toยท17hยท
Discuss: DEV
๐Ÿ”’TLS/SSL
Flag this post
Using Salient Object Detection to Identify Manipulative Cookie Banners that Circumvent GDPR
arxiv.orgยท1d
๐Ÿ”Cybersecurity
Flag this post
[TUI] Ricing the original Rogue
github.comยท6hยท
๐Ÿ”’TLS/SSL
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.plยท1dยท
Discuss: Hacker News
๐Ÿ”’TLS/SSL
Flag this post
Potential Domain Changes
floral.lgbtยท2h
๐ŸŒDNS
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท1dยท
Discuss: Hacker News
๐Ÿ”’TLS/SSL
Flag this post
Hackers love when you reuse passwordsโ€”hereโ€™s why itโ€™s so dangerous
howtogeek.comยท1d
๐Ÿ”Cybersecurity
Flag this post
Tycoon 2FA Phishing Kit Analysis
cybereason.comยท1d
๐Ÿ”’TLS/SSL
Flag this post
US Govt Whistleblower Guide
lesswrong.comยท19h
๐Ÿ”Cybersecurity
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netยท4dยท
Discuss: Hacker News
๐Ÿ”’TLS/SSL
Flag this post
Angular Authentication with Cookies in 10 minutes
dev.toยท22hยท
Discuss: DEV
๐Ÿ”Cybersecurity
Flag this post
I Built a One File Edge Probe to Tell Me When Time Is Lying
physical-ai.ghost.ioยท1dยท
Discuss: Hacker News
๐ŸฆˆWireshark
Flag this post
Build your own GPG in Rust
andrewhalle.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ”’TLS/SSL
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.comยท1d
๐Ÿ’‰SQL Injection
Flag this post
Credentials Evidence or Simulate
preludes.euยท1dยท
Discuss: Hacker News
๐Ÿ”Cryptography
Flag this post