App & Data Security
Let's build secure apps
Most of us aren’t taught security when learning how to build apps. Let’s change that, and make our applications more secure one lesson at a time.
When I first heard the term OS Command injections, or “Shell injection” as some people refer to it, I don’t know why but I assumed
I love quotes! I mean… really love them. In just one or two lines I can get or give the inspiration or motivation I need
I made a Python keylogger that sends emails containing recorded data from the target machine, and this post explains how it works! This program is
Now that we’ve covered general concepts of SQL for SQL injections, and we’ve learned the basics of powerful SQL injection techniques, let’s gather SQL injection
Are there ANY pitfalls to using Python? There are a lot of good reasons to use Python. That made me wonder what the downsides were.
Ask questions, get answers, and share resources in the App & Data Security forums.
Chat in real time with course authors, mentors, and other Cybr members.