Henrique CabralOpen RedirectOpen redirect vulnerabilities occur when an application redirects a user to an untrusted external URL that can be controlled by an…1 min read·May 9, 2023----
Henrique CabralUnreleased ResourcesUnreleased resource vulnerabilities occur when a program or application fails to properly release or deallocate system resources, such as…1 min read·May 9, 2023----
Henrique CabralLocal File InclusionLFI (Local File Inclusion) is a type of security vulnerability that occurs when an attacker is able to include files on the server by…2 min read·May 9, 2023----
Henrique CabralSQL InjectionSQL injection is a type of security vulnerability that occurs when an attacker is able to inject malicious SQL code into a database query…1 min read·May 8, 2023----
Henrique CabralXSSXSS (Cross-Site Scripting) is a type of security vulnerability that occurs when an attacker injects malicious code into a web page viewed…2 min read·Apr 19, 2023----
Henrique CabralPasswordless WorldAttending Google I/O has brought me so many brainstormings, one of which was about the concept of passwordless in the cybersecurity world…1 min read·May 17, 2022----
Henrique CabralMalware VaccinesI had to say that I’m stunned by the article, video, and repo by Karsten Hahn, which talks about a technique that uses harmless parts of…1 min read·Feb 14, 2022----
Henrique CabralFoundations of Information Security: A Straightforward IntroductionWritten by Jason Andress, this book is a must to all fresh starters in cyber security. It will introduce you to fundamental concepts that…2 min read·Feb 13, 2022----
Henrique CabralSecure Coding PoemWriten by Andrew Myers, called the Gashlycode Tinies, and it encapsulates a bunch of failures to follow important rules. It’s inspired by…1 min read·Feb 7, 2022----
Henrique CabralHow to secure architect software developmentThere are tons of models popping up in the past few years, but let’s keep it simple here.1 min read·Feb 7, 2022----