-
CORS: the ultimate guide
.
Imagine visiting a website showing innocent kitten pictures. But behind all those cute feline creatures hides this website’s superpower. As soon as someone visits this website, the owner of…
-
Protecting your baby: The SAFER Framework for Secure Coding
.
In that dimly lit hospital room, I lifted that small and fragile baby. Even though my wife just gave birth to him, I instinctively loved him. I vowed to…
-
Lock Down Your Admin Area: How to Control Access for Maximum Security
.
The white house situation room is the pinnacle of power in the USA and in the world. There, the president gets his security briefings, and from there he can…
-
The simple 3 step process to reduce your network exposure
.
In an n-tier architecture application, a client communicates with at least one service. This target service is hosted on a particular server. Let us take a web application as…
-
7 tips to make your upload API hack proof
.
If you allow users to upload files, you need to make sure your website is secure against common file upload attacks. This post helps you identify potential issues and…
-
How RCE Vulnerabilities Spell Disaster for Websites and Companies
.
Remote Code Execution (RCE) is a category of vulnerabilities. These allow an attacker to execute system commands on the server. A lot of vulnerabilities allow direct system command execution….