• Community
    • Join Discord
    • Industry News
    • Discussions
    • Contact & Support
  • Learn
    • 🧪 Hands-On Labs
    • Featured Courses
    • All Courses
    • Categories
      • Cybersecurity Fundamentals
      • Networking Security
      • Application Security
      • Ethical Hacking
      • Cloud Security
  • Resources
    • Blog
    • Ebooks
    • Podcasts
    • Webinars
  • Pricing
  • About Cybr
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Community
      • Join Discord
      • Industry News
      • Discussions
      • Contact & Support
    • Learn
      • 🧪 Hands-On Labs
      • Featured Courses
      • All Courses
      • Categories
        • Cybersecurity Fundamentals
        • Networking Security
        • Application Security
        • Ethical Hacking
        • Cloud Security
    • Resources
      • Blog
      • Ebooks
      • Podcasts
      • Webinars
    • Pricing
    • About Cybr
    Sign in Sign up

    Category: Application Security

    Content and resources related to Application Security (AppSec)

    Request Forgeries for the Security+

    Request forgeries (CSRF, XSRF, SSRF)

    In 2020, CheckPoint Research announced multiple vulnerabilities in the popular social media application named TikTok. One of the found vulnerabilities allowed an attacker to delete…

    Christophe September 1, 2023
    0 Comments
    Directory / Path traversal for the Security+

    Directory / Path Traversal

    Just like you have directories on your PC, laptop, and mobile phones, web servers also have directories. For example, if you were to purchase web…

    Christophe August 29, 2023
    0 Comments
    Running SAST tooling

    Static Application Security Testing (SAST)

    What if you could take multiple senior developers and security experts, distill them into a tool, and then have the ability to run that tool…

    Christophe July 7, 2023
    0 Comments
    Reverse and Forward Proxy Servers

    Proxy Servers

    Proxy servers are a topic that you can expect to get quizzed on in the CompTIA Security+ exam. To make sure you can answer questions…

    Christophe June 16, 2023
    0 Comments
    AWS WAF getting started guide

    AWS WAF Made Simple: Protect Your Web Apps In The Cloud

    AWS built its own Web Application Firewall and named the service AWS WAF, and we’re going to take a detailed look at how we can…

    Christophe June 13, 2023
    0 Comments
    SQL Injections Explained Series

    What are SQL Injections? // Explained in 180 seconds

    Whenever you visit a website or use some kind of application, that website or app needs to pull data from a database. For example, let’s…

    Christophe May 17, 2023
    0 Comments
    HashiCorp Vault Explained

    What is HashiCorp Vault and why should you know about it?

    Vault is an open-source secrets management tool used to automate access to secrets, data, and systems. This blog post comes from our Explained in 180…

    Christophe May 8, 2023
    0 Comments
    Hashing use cases

    Hashing use cases

    In practice, what is hashing used for? How is it being used in the real world? Let’s take a look at a few common hashing…

    Christophe July 18, 2022
    0 Comments
    Hash tables and rainbow table attacks banner

    Hash Tables, Rainbow Table Attacks, and Salts

    As we talked about, applications that properly handle passwords don’t actually store the passwords themselves in databases, but instead, store hashes of passwords. That’s why…

    Christophe July 11, 2022
    0 Comments
    Banner for plaintext versus encrypted versus hashed passwords

    Encrypted versus hashed passwords. What’s the difference?

    As you study for the CompTIA Security+ exam, it’s important that you understand the differences between plaintext, encrypted, and hashed passwords. It’s common to hear…

    Christophe June 25, 2022
    0 Comments
    Load More

    Get notified of new posts

    Recent Posts

    • Incident response process
    • Network ACLs (NACLs) versus Security Groups (SGs) (Cheat Sheet)
    • Network Access Control (NAC)
    • Modes of operation
    • Cipher Suites

    Categories

    • Advanced
    • Announcements
    • Application Security
    • Beginner
    • Career
    • Certifications
    • Cloud Security
    • Community
    • Cybersecurity
    • Cybersecurity Fundamentals
    • Ethical Hacking
    • Explained Series
    • Incident Response
    • Intermediate
    • Network Security
    • Programming Languages
    • Scripting

    Recent Comments

    • Daniel Kakwata on Performance-based Questions #1
    • Christophe on Attacking web apps manually
    • meher-vardhan on Attacking web apps manually
    • Patrick on Course Overview
    • Patrick on Juan’s Intro
    Cybr logo badge
    © 2023 - Cybr, Inc
    • Contact
    • Courses
    • Discord
    • Terms of Service
    • Privacy Policy

    Report

    There was a problem reporting this post.

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts

    Please allow a few minutes for this process to complete.

    Report

    You have already reported this .