Refind

security

Collection by Lea R. 🦄

github.com

0xRadi/OWASP-Web-Checklist: OWASP Web Application Security Testing Checklist

2021-12-13 · OWASP Web Application Security Testing Checklist. Contribute to 0xRadi/OWASP-Web-Checklist development by creating an account on GitHub. · Shared by 4, including Lea R. 🦄
geekflare.com

Why and How to Secure API Endpoint?

8 min · From 2020 · How are you securing your API? It's the age of the digital economy explosion, and massive data loads are being piped through APIs. Business, gaming, · Shared by 4, including Lea R. 🦄
jsoverson.medium.com

Bypassing CAPTCHAs with Headless Chrome

12+ min · From 2020 · Using 2Captcha and Puppeteer to automate through CAPTCHAs · Shared by 4, including Lea R. 🦄
google
captcha
securecodewarrior.com

Become a secure code warrior

1 min · From 2020 · We get it. You're here because you want to start left but maybe you don't know where to begin? And we want you to start left because we want you to think and act with a secure coding mindset; without… · Shared by 4, including Lea R. 🦄
security
vuln.whitesourcesoftware.com

Open Source Vulnerabilities Database

1 min · From 2020 · WhiteSource’s Vulnerability Lab is a free and searchable open source vulnerabilities database, providing the most comprehensive vulnerability developer resource around. · Shared by 4, including Lea R. 🦄
security
vulnerability
freeCodeCamp.org

The OWASP Top 10 – A Technical Deep-Dive into Web Security

5 min · From 2020 · In terms of security, there are many vulnerabilities that need to be treated and prevented, but some need more attention than others. Without question, the best guide to help you address these… · Shared by 12, including Lea R. 🦄
googleprojectzero.blogspot.com

Project Zero

5 min · From 2018 · News and updates from the Project Zero team at Google · Shared by 8, including Lea R. 🦄
google
cynet.com

Recent Escalations in Cyberattacks in Italy Prove the Coronavirus Impact on Cybersecurity

2 min · From 2020 · The global Coronavirus epidemic impacts economies worldwide, creating a new reality in which many employees are working from home, forcing […] · Shared by 4, including Lea R. 🦄
geekflare.com

6 Tools to Scan Node.js Application for Security Vulnerability

6 min · From 2017 · Find Node.js security vulnerability and protect them by fixing before someone hack your application. There are a number of online tools to find common security vulnerability for PHP, WordPress,… · Shared by 10, including Nico Müller 🇺🇦, Lea R. 🦄, Matt
node
security
github.com

OWASP/NodeGoat

From 2020 · The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them. - OWASP/NodeGoat · Shared by 5, including Lea R. 🦄
owasp

OWASP

2 min · From 2017 · From OWASP Every vibrant technology marketplace needs an unbiased source of information on best practices as well as an active body advocating open standards. In the Application Security space, one of… · Shared by 11, including Lea R. 🦄, Dr. Pete Meyers
f0.holisticinfosecforwebdevelopers.com

Table of Contents

From 2020 · Foreword Preface Description Purpose Reason Acknowledgements Influences Introduction Starting with the 30,000’ View · Shared by 4, including Lea R. 🦄
web
security
issms2fasecure.com

Is SMS 2FA Secure?

From 2020 · Shared by 83, including René Pfitzner, slumos, Alexander Seifert, Evan Kirstel the $B2B Techfluencer, Lea R. 🦄, DHH, Ellen Shapiro, Elena Neira, Vinny Lingham, Mark Kaigwa, Hans Bickhofe, Vikram Dutt
cybersecurity
nginx.com

What is a WAF or Web Application Firewall?

1 min · From 2020 · A web application firewall or WAF protects servers by filtering & monitoring incoming traffic… Learn more about web services, security, etc in our NGINX learning & resource section. · Shared by 5, including Lea R. 🦄
security
nginx
owasp

OWASP Testing Guide v4 Table of Contents

6 min · From 2015 · This is the FINAL table of content of the New Testing Guide v4. You can download the Guide here Back to the OWASP Testing Guide Project: http://www.owasp.org/index.php/OWASP_Testing_Project Testing… · Shared by 7, including Lea R. 🦄
security
testing
blog.daniel-ruf.de

binary planting and arbitrary file (over)write vulnerabilities in npm, pnpm and yarn

3 min · From 2019 · npm, pnpm and yarn were vulnerable to binary planting and arbitrary file (over)write through the bin field in package.json. · Shared by 5, including Lea R. 🦄
Get smarter every day.
About RefindTopicsDeep Dives
AdvertiseCross-promotionPrivacy
© 2023 Refind Inc.
Apple App StoreGoogle Play StoreChrome Web Store
×

Share security

https://refind.com/leakreimann/security