Open RedirectOpen redirect vulnerabilities occur when an application redirects a user to an untrusted external URL that can be controlled by an…May 9, 2023May 9, 2023
Unreleased ResourcesUnreleased resource vulnerabilities occur when a program or application fails to properly release or deallocate system resources, such as…May 9, 2023May 9, 2023
Local File InclusionLFI (Local File Inclusion) is a type of security vulnerability that occurs when an attacker is able to include files on the server by…May 9, 2023May 9, 2023
SQL InjectionSQL injection is a type of security vulnerability that occurs when an attacker is able to inject malicious SQL code into a database query…May 8, 2023May 8, 2023
XSSXSS (Cross-Site Scripting) is a type of security vulnerability that occurs when an attacker injects malicious code into a web page viewed…Apr 19, 2023Apr 19, 2023
Passwordless WorldAttending Google I/O has brought me so many brainstormings, one of which was about the concept of passwordless in the cybersecurity world…May 17, 2022May 17, 2022
Malware VaccinesI had to say that I’m stunned by the article, video, and repo by Karsten Hahn, which talks about a technique that uses harmless parts of…Feb 14, 2022Feb 14, 2022
Foundations of Information Security: A Straightforward IntroductionWritten by Jason Andress, this book is a must to all fresh starters in cyber security. It will introduce you to fundamental concepts that…Feb 13, 2022Feb 13, 2022
Secure Coding PoemWriten by Andrew Myers, called the Gashlycode Tinies, and it encapsulates a bunch of failures to follow important rules. It’s inspired by…Feb 7, 2022Feb 7, 2022
How to secure architect software developmentThere are tons of models popping up in the past few years, but let’s keep it simple here.Feb 7, 2022Feb 7, 2022