Request forgeries (CSRF, XSRF, SSRF)
In 2020, CheckPoint Research announced multiple vulnerabilities in the popular social media application named TikTok. One of the found vulnerabilities allowed an attacker to delete…
Content and resources related to Application Security (AppSec)
In 2020, CheckPoint Research announced multiple vulnerabilities in the popular social media application named TikTok. One of the found vulnerabilities allowed an attacker to delete…
Just like you have directories on your PC, laptop, and mobile phones, web servers also have directories. For example, if you were to purchase web…
What if you could take multiple senior developers and security experts, distill them into a tool, and then have the ability to run that tool…
Proxy servers are a topic that you can expect to get quizzed on in the CompTIA Security+ exam. To make sure you can answer questions…
AWS built its own Web Application Firewall and named the service AWS WAF, and we’re going to take a detailed look at how we can…
Whenever you visit a website or use some kind of application, that website or app needs to pull data from a database. For example, let’s…
Vault is an open-source secrets management tool used to automate access to secrets, data, and systems. This blog post comes from our Explained in 180…
In practice, what is hashing used for? How is it being used in the real world? Let’s take a look at a few common hashing…
As we talked about, applications that properly handle passwords don’t actually store the passwords themselves in databases, but instead, store hashes of passwords. That’s why…
As you study for the CompTIA Security+ exam, it’s important that you understand the differences between plaintext, encrypted, and hashed passwords. It’s common to hear…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.