loading...
👋 Sign in for the ability sort posts by top and latest.

Browser Fingerprinting

Reactions 39 Comments 8
3 min read

YouTube and The Strange Hackings - Short Theory

Reactions 5
3 min read

7 Steps to Web Application Security

Reactions 9
5 min read

Software Security Overview

Reactions 25 Comments 8
10 min read

The joy of exploring cybersecurity, and how to get started

Reactions 5
3 min read

Application Security is Broken. Here is How We Intend to Fix It.

Reactions 6
4 min read

0x00SEC CTF - Exercise #7

Reactions 3
3 min read

Implementing Facebook Login on iOS without the Facebook SDK

Reactions 7 Comments 2
14 min read

How to enable CSRF protection in the Python / Flask app?

Reactions 6
2 min read

Security Practices for Mobile App Developers

Reactions 4
6 min read

If you want to build a treehouse, start at the bottom

Reactions 30 Comments 1
4 min read

Helm: helm-secrets — sensitive data encryption with AWS KMS and use it from Jenkins

Reactions 6
12 min read

HTB CTF - I know Mag1k

Reactions 6
3 min read

Why 'Escaping' JavaScript is Dangerous

Reactions 46 Comments 1
3 min read

#showdevWhat is the OWASP ?

Reactions 9 Comments 2
12 min read

[GitHub] File signature and crypto operations with Java

Reactions 4
1 min read

Getting started with Spring Security - Authentication and Authorization

Reactions 26 Comments 2
4 min read

All about SIEM

Reactions 3
2 min read

How to setup a Remote Development Server

Reactions 48 Comments 5
5 min read

Why SSL Shrinkage Is A Good Thing For Security

Reactions 3
3 min read

Riddikulus Passwords: Celebrate Passwords Every Day

Reactions 7 Comments 4
5 min read

8 free security tools every developer should know and use to Shift Left

Reactions 8
7 min read

Argo CD secrets management using Sops

Reactions 6
3 min read

Secure way of doing OAuth for SPA & Native Apps

Reactions 23
3 min read

No more passwords

Reactions 6
2 min read

Exploitation Exercise with unsafe.Pointer in Go: Information Leak (Part 1)

Reactions 4
9 min read

SQL injection for developers

Reactions 114 Comments 4
12 min read

#newsZoom has acquired Keybase

Reactions 57 Comments 29
1 min read

Preventing SQL injection: a Django author's perspective

Reactions 3
8 min read

Django Rest Framework custom JWT authentication

Reactions 15 Comments 9
8 min read

Use your Yubikey to its Fullest

Reactions 23 Comments 2
8 min read

Recap of GitHub Satellite

Reactions 33 Comments 12
1 min read

How to handle PII in websites and web apps

Reactions 6
7 min read

Protecting Azure Functions with API Management Service

Reactions 10 Comments 1
5 min read

How to Perform a Cyber Security Risk Assessment: A Step-by-Step Guide

Reactions 8
4 min read

Security news weekly round-up

Reactions 4 Comments 1
2 min read

Once upon a time, PASSWORDS 🔑🤯☠️

Reactions 7 Comments 1
4 min read

How to use open source kube-scan to find Kubernetes security risks

Reactions 6
3 min read

What is OAuth 2.0 / OpenID Connect?

Reactions 10
3 min read

Add Google Authentication to any Website using Nginx and Oauth Proxy

Reactions 3
3 min read

Vulnerability Management: 5 Best Practices to Protect Your Business

Reactions 7
9 min read

Stop with the arbitrary restrictions on passwords

Reactions 29 Comments 18
2 min read

PHP SECURITY: How to deal with common web vulnerabilities

Reactions 4 Comments 2
8 min read

Hacking 101 — Footprinting (Theory Part-1)

Reactions 5
3 min read

Getting started with Spring Security - Adding JWT

Reactions 10
4 min read

Adding Sign in with Apple to your iOS App

Reactions 66
7 min read

Writeup: HackTheBox Jerry - Without Metasploit (OSCP Prep)

Reactions 3
3 min read

How'd I Get Here? Exploiting Redirection

Reactions 3
4 min read

Differences Between Static Code Analysis and Dynamic Testing

Reactions 6
5 min read

Discover SSH And Use It With Github

Reactions 7
5 min read

How to handle Database in Spring Boot

Reactions 18
2 min read

5 security blogs you should follow

Reactions 18
2 min read

Artigo cientifico - Containers

Reactions 3 Comments 2
9 min read

0x00SEC CTF - Exercise #6

Reactions 3
3 min read

API Security for the Data Layer

Reactions 3
3 min read

0x00SEC CTF - Exercise #5

Reactions 3
4 min read

0x00SEC CTF - Exercise #4

Reactions 3
4 min read

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Reactions 9
3 min read

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Reactions 5
3 min read

Web Security Testing with OWASP ZAP and Selenium

Reactions 6
5 min read
loading...