Refind
×

security

Collection by Lea R. 🦄

github.com

0xRadi/OWASP-Web-Checklist: OWASP Web Application Security Testing Checklist

2021-12-13 · OWASP Web Application Security Testing Checklist. Contribute to 0xRadi/OWASP-Web-Checklist development by creating an account on GitHub.
Shared by 4, including Lea R. 🦄
geekflare.com

Why and How to Secure API Endpoint?

8 min read · 2020-12-11 · How are you securing your API? It's the age of the digital economy explosion, and massive data loads are being piped through APIs. Business, gaming,
Reader View · Shared by 4, including Lea R. 🦄
jsoverson.medium.com

Bypassing CAPTCHAs with Headless Chrome

~12 min read · 2020-12-11 · Using 2Captcha and Puppeteer to automate through CAPTCHAs
Reader View · Shared by 4, including Lea R. 🦄
recaptcha
google
captcha
securecodewarrior.com

Become a secure code warrior

1 min read · 2020-11-12 · We get it. You're here because you want to start left but maybe you don't know where to begin? And we want you to start left because we want you to think and act with a secure coding mindset; without…
Shared by 4, including Lea R. 🦄
security
dev
devsecops
vuln.whitesourcesoftware.com

Open Source Vulnerabilities Database

1 min read · From 2020 · WhiteSource’s Vulnerability Lab is a free and searchable open source vulnerabilities database, providing the most comprehensive vulnerability developer resource around.
Shared by 4, including Lea R. 🦄
vulnerability
database
security
freeCodeCamp.org

The OWASP Top 10 – A Technical Deep-Dive into Web Security

5 min read · From 2020 · In terms of security, there are many vulnerabilities that need to be treated and prevented, but some need more attention than others. Without question, the best guide to help you address these…
Reader View · Shared by 12, including Lea R. 🦄
googleprojectzero.blogspot.com

Project Zero

5 min read · From 2018 · News and updates from the Project Zero team at Google
Shared by 8, including Lea R. 🦄
google
vulnerabilities
cynet.com

Recent Escalations in Cyberattacks in Italy Prove the Coronavirus Impact on Cybersecurity

2 min read · From 2020 · The global Coronavirus epidemic impacts economies worldwide, creating a new reality in which many employees are working from home, forcing […]
Reader View · Shared by 4, including Lea R. 🦄
geekflare.com

6 Tools to Scan Node.js Application for Security Vulnerability

6 min read · From 2017 · Find Node.js security vulnerability and protect them by fixing before someone hack your application. There are a number of online tools to find common security vulnerability for PHP, WordPress,…
Reader View · Shared by 10, including Nico Müller 🇺🇦, Matt, Lea R. 🦄
node
security
github.com

OWASP/NodeGoat

From 2020 · The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them. - OWASP/NodeGoat
Shared by 5, including Lea R. 🦄
owasp

OWASP

2 min read · From 2017 · From OWASP Every vibrant technology marketplace needs an unbiased source of information on best practices as well as an active body advocating open standards. In the Application Security space, one of…
Reader View · Shared by 11, including Lea R. 🦄, Dr. Pete Meyers
f0.holisticinfosecforwebdevelopers.com

Table of Contents

From 2020 · Foreword Preface Description Purpose Reason Acknowledgements Influences Introduction Starting with the 30,000’ View
Shared by 4, including Lea R. 🦄
web
security
issms2fasecure.com

Is SMS 2FA Secure?

From 2020
Shared by 83, including René Pfitzner, slumos, Lea R. 🦄, Evan Kirstel the $B2B Techfluencer, Alexander Seifert, DHH, Ellen Shapiro, Elena Neira, Vinny Lingham, Mark Kaigwa, Hans Bickhofe, Vikram Dutt
cybersecurity
2fa
nginx.com

What is a WAF or Web Application Firewall?

1 min read · From 2020 · A web application firewall or WAF protects servers by filtering & monitoring incoming traffic… Learn more about web services, security, etc in our NGINX learning & resource section.
Reader View · Shared by 5, including Lea R. 🦄
nginx
waf
security
owasp

OWASP Testing Guide v4 Table of Contents

6 min read · From 2015 · This is the FINAL table of content of the New Testing Guide v4. You can download the Guide here Back to the OWASP Testing Guide Project: http://www.owasp.org/index.php/OWASP_Testing_Project Testing…
Reader View · Shared by 6, including Lea R. 🦄
owasp
security
testing
blog.daniel-ruf.de

binary planting and arbitrary file (over)write vulnerabilities in npm, pnpm and yarn

3 min read · From 2019 · npm, pnpm and yarn were vulnerable to binary planting and arbitrary file (over)write through the bin field in package.json.
Reader View · Shared by 5, including Lea R. 🦄
Get smarter every day.
About RefindDeep DivesTopicsHashtagsHelpLegal
PublishersCuratorsCross-promotionSponsors
© 2022 Refind Inc.
Apple App StoreGoogle Play StoreChrome Web Store
×

Get smarter every day

Every day we pick 7 links from around the web for you, tailored to your interests.

Or sign in with Twitter or Google


Have an account? Sign in

×

Get smarter every day

Every day we pick 7 links from around the web for you, tailored to your interests.

Or sign in with Twitter or Google


Not on Refind yet? Sign up

×

Share security

https://refind.com/leakreimann/security