Henrique CabralOpen RedirectOpen redirect vulnerabilities occur when an application redirects a user to an untrusted external URL that can be controlled by an…May 9, 2023May 9, 2023
Henrique CabralUnreleased ResourcesUnreleased resource vulnerabilities occur when a program or application fails to properly release or deallocate system resources, such as…May 9, 2023May 9, 2023
Henrique CabralLocal File InclusionLFI (Local File Inclusion) is a type of security vulnerability that occurs when an attacker is able to include files on the server by…May 9, 2023May 9, 2023
Henrique CabralSQL InjectionSQL injection is a type of security vulnerability that occurs when an attacker is able to inject malicious SQL code into a database query…May 8, 2023May 8, 2023
Henrique CabralXSSXSS (Cross-Site Scripting) is a type of security vulnerability that occurs when an attacker injects malicious code into a web page viewed…Apr 19, 2023Apr 19, 2023
Henrique CabralPasswordless WorldAttending Google I/O has brought me so many brainstormings, one of which was about the concept of passwordless in the cybersecurity world…May 17, 2022May 17, 2022
Henrique CabralMalware VaccinesI had to say that I’m stunned by the article, video, and repo by Karsten Hahn, which talks about a technique that uses harmless parts of…Feb 14, 2022Feb 14, 2022
Henrique CabralFoundations of Information Security: A Straightforward IntroductionWritten by Jason Andress, this book is a must to all fresh starters in cyber security. It will introduce you to fundamental concepts that…Feb 13, 2022Feb 13, 2022
Henrique CabralSecure Coding PoemWriten by Andrew Myers, called the Gashlycode Tinies, and it encapsulates a bunch of failures to follow important rules. It’s inspired by…Feb 7, 2022Feb 7, 2022
Henrique CabralHow to secure architect software developmentThere are tons of models popping up in the past few years, but let’s keep it simple here.Feb 7, 2022Feb 7, 2022