CyberSecTools | Find Cybersecurity Tools and Resources
Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.
Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
A publicly accessible database belonging to DeepSeek allowed full control over database operations, including the ability to access internal data. The exposure includes over a million lines of log streams with highly sensitive information.
Some vulnerabilities are invisible. Rather than inserting logical bugs, adversaries can attack the encoding of source code files to inject vulnerabilities.
Messaging Layer Security is now an internet standard | The Mozilla Blog
Today, the Internet Engineering Task Force (IETF) is releasing the standard for Messaging Layer Security (MLS) protocol, a novel standard of communication
Microservice Security Design Patterns for Kubernetes (Part 1) - Brazil's Blog
In this multi-part blog series, I will describe some microservice security design patterns to implement micro-segmentation and deep inspection in your Kubernetes cluster
Developer Advocate Nate Barbettini breaks down OpenID and OAuth 2.0 in Plain English. NOTE: This video is from 2018 and contains some information that is now...
Realms are an old concept in the JavaScript ecosystem, but with the rise of supply chain types of attacks realms became a powerful tool for attackers to bypass well known browser runtime security tools. In order to address this concern, we first must understand - what is a realm in JavaScript?
OAuth 2.0 and OpenID Connect (OIDC) are internet standards that enable one application to access data from another. Unfortunately, these standards use a lot ...
Authentication on the Web (Sessions, Cookies, JWT, localStorage, and more)
In this video, we will cover the fundamentals of user authentication in modern web applications and websites. In particular, we will explore stateful (sessio...