So I've been working as a security analyst and auditor for a while and I encountered a lot of stuff I felt frustrated about. Sometimes I used to th...
For further actions, you may consider blocking this person and/or reporting abuse
Great article!
I would add being mindful of the dependencies one chooses to use in their apps. Out of date dependencies are plentiful.
What is your opinion / thoughts on third party authentication, such as login with Google, etc..?
It depends, I think it can be convenient, I'm not a Google fan tho. Not due to security (which I think it's quite strong) but due to privacy and data processing.
Thanks for the article keep writing!
thank you! I'm glad you enjoyed it.
specially
I keep hearing that one with Docker, even though their devs themselves had repeatedly said that containers are not about security, at all, is about ease to deploy and dependency management.
Article's good but loved the Gifs... 🔥🤟
Hahaha thank you
Owasp provides an extensive overview as well as a top ten list:
owasp.org/index.php/Category:OWASP...
Injection is for example the number one vulnerability.