Found 77 bookmarks
Newest
Secure Code Review Tips to Defend Against Vulnerable Node.js Code
Secure Code Review Tips to Defend Against Vulnerable Node.js Code
How do you identify vulnerable code patterns? Can you spot insufficient input validation? Enhance your Node.js development security with this guide to secure code review.
·nodejs-security.com·
Secure Code Review Tips to Defend Against Vulnerable Node.js Code
The reckoning on cloud container and serverless security
The reckoning on cloud container and serverless security
Ephemeral infrastructure's transient nature has afforded it a 'free pass' on forensic examination in the past, but that window is closing.
·technologydecisions.com.au·
The reckoning on cloud container and serverless security
What the !#@% is a Passkey?
What the !#@% is a Passkey?
A new login technique is becoming available in 2023: the passkey. The passkey promises to solve phishing and prevent password reuse. But lots of smart and security-oriented folks are confused about what exactly a passkey is. There’s a good reason for that. A passkey is in some sense one of two (or three) different things, depending on how it’s stored.
·eff.org·
What the !#@% is a Passkey?
Serverless Security: Protecting Functions in the Cloud
Serverless Security: Protecting Functions in the Cloud
Serverless computing has revolutionized the way applications are built and deployed in the cloud. By abstracting away servers, serverless…
·medium.com·
Serverless Security: Protecting Functions in the Cloud
From Akamai to F5 to NTLM... with love.
From Akamai to F5 to NTLM... with love.
In this post, I am going to show the readers how I was able to abuse Akamai so I could abuse F5 to steal internal data including authorization and session tokens from their customers.
·blog.malicious.group·
From Akamai to F5 to NTLM... with love.
Threat Hunting: Detecting Browser Credential Stealing [T1555.003] - FourCore
Threat Hunting: Detecting Browser Credential Stealing [T1555.003] - FourCore
Adversaries can steal credentials, cookies and other private data from browsers using various techniques. We cover how you can simulate Credential Stealing From Browser s and detect it with your security tools. Sigma Rules Inside.
·fourcore.io·
Threat Hunting: Detecting Browser Credential Stealing [T1555.003] - FourCore
The UK Online Safety Bill Becomes Law, What Does It Mean?
The UK Online Safety Bill Becomes Law, What Does It Mean?
We’ve previously reported from the UK about the Online Safety Bill, a piece of internet safety legislation that contains several concerning provisions relating to online privacy and encryptio…
·hackaday.com·
The UK Online Safety Bill Becomes Law, What Does It Mean?
A deep dive into Deno and its comparison with Node.js
A deep dive into Deno and its comparison with Node.js
Explore Deno and Node.js differences. Learn about Deno's enhanced module system, stable APIs, and security. Discover its use cases and drawbacks in the tech world.
·bejamas.io·
A deep dive into Deno and its comparison with Node.js
How To Secure Your Web App With HTTP Headers — Smashing Magazine
How To Secure Your Web App With HTTP Headers — Smashing Magazine
Web applications, be they thin websites or thick single-page apps, are notorious targets for cyber-attacks. In 2016, approximately 40% of data breaches originated from attacks on web apps — the leading attack pattern. Indeed, these days, understanding cyber-security is not a luxury but rather **a necessity for web developers**, especially for developers who build consumer-facing applications. HTTP response headers can be leveraged to tighten up the security of web apps, typically just by adding a few lines of code. In this article, we’ll show how web developers can use HTTP headers to build secure apps. While the code examples are for Node.js, setting HTTP response headers is supported across all major server-side-rendering platforms and is typically simple to set up.
·smashingmagazine.com·
How To Secure Your Web App With HTTP Headers — Smashing Magazine
Content Security Policy, Your Future Best Friend — Smashing Magazine
Content Security Policy, Your Future Best Friend — Smashing Magazine
The benefits of using a “content security policy” are many. In this article, Nicolas Hoffmann will introduce you to this technology, and he’ll explain why awareness is the most important advantage of CSP for website maintainers.
·smashingmagazine.com·
Content Security Policy, Your Future Best Friend — Smashing Magazine
Top 10 Cyber Security Threats 2023
Top 10 Cyber Security Threats 2023
# Insider Threats, #Ransomware, AI-Powered Attacks, Cloud Security, Cyber Threat Landscape, Cybersecurity Threats, Emerging technologies…
·medium.com·
Top 10 Cyber Security Threats 2023
Salt Labs | Oh-Auth - Abusing OAuth to take over millions of accounts
Salt Labs | Oh-Auth - Abusing OAuth to take over millions of accounts
It’s extremely important to make sure your OAuth implementation is secure. The fix is just one line of code away. We sincerely hope the information shared in our blog post series will help prevent major online breaches and help web service owners better protect their customers and users.
·salt.security·
Salt Labs | Oh-Auth - Abusing OAuth to take over millions of accounts
Securing Rails Applications — Ruby on Rails Guides
Securing Rails Applications — Ruby on Rails Guides
This manual describes common security problems in web applications and how to avoid them with Rails.After reading this guide, you will know: All countermeasures that are highlighted. The concept of sessions in Rails, what to put in there and popular attack methods. How just visiting a site can be a security problem (with CSRF). What you have to pay attention to when working with files or providing an administration interface. How to manage users: Logging in and out and attack methods on all layers. And the most popular injection attack methods.
·guides.rubyonrails.org·
Securing Rails Applications — Ruby on Rails Guides
Shamir Secret Sharing
Shamir Secret Sharing
It’s 3am. Paul, the head of PayPal database administration carefully enters his elaborate passphrase at a keyboard in a darkened cubicle of 1840 Embarcadero Road in East Palo Alto, for the fifth time....
·max.levch.in·
Shamir Secret Sharing
Mastodon and Lemmy are turning into tiny DDoS botnets
Mastodon and Lemmy are turning into tiny DDoS botnets
I know for a fact that this site can handle the Hacker News front page as I have been on it a few times in the last two years, and today - someone
·stackdiary.com·
Mastodon and Lemmy are turning into tiny DDoS botnets
Ethical Hacking 101 Workshop
Ethical Hacking 101 Workshop
Join this hands-on, virtual workshop to get an introduction to ethical hacking and learn how you can proactively identify security weaknesses in your systems before they can be exploited.
·go.snyk.io·
Ethical Hacking 101 Workshop
CSS Fingerprint
CSS Fingerprint
CSS fingerprinting, no JS required!
·csstracking.dev·
CSS Fingerprint