InFAUNโโโDeveloper Community ๐พbyMartin ThomaContent Security Policy (CSP) ๐In todayโs digital landscape, web security threats have become increasingly sophisticated and pervasive. As our reliance on the internetโฆApr 9, 2023Apr 9, 2023
InFAUNโโโDeveloper Community ๐พbyMartin ThomaSQL InjectionsWhat they are, how to use them, and how to prevent themOct 12, 2020Oct 12, 2020
InLevel Up CodingbyMartin ThomaLeaking SecretsHow it happens and how you prevent itOct 13, 2020Oct 13, 2020
InLevel Up CodingbyMartin ThomaCross-site Scripting (XSS) ๐What it is, why it matters, how they are executed, how to prevent XSS attacksโโโand how to create a cookie stealer!Oct 16, 2020Oct 16, 2020
InInfoSec Write-upsbyMartin ThomaZIP Bombs ๐ฃ๐Make your storage explode ๐ฅOct 28, 2020Oct 28, 2020
InInfoSec Write-upsbyMartin ThomaEmail Spoofing ๐Email spoofing is the creation of emails with a forged sender address. Faking the sendersโ address is often a part of a phishing attackโฆDec 2, 20201Dec 2, 20201
InPython in Plain EnglishbyMartin ThomaSoftware Composition Analysis (SCA)The job as a software developer is pretty crazy: You need to learn constantly about new technologies, understand topics within the domainโฆDec 4, 20201Dec 4, 20201
InFAUNโโโDeveloper Community ๐พbyMartin ThomaXXE attacks ๐PDF, Excel, SVG, ebooksโโโall use XML. They can be vulnerable.Dec 7, 2020Dec 7, 2020
InLevel Up CodingbyMartin ThomaEffective Access Control ๐Access control is the act of restricting access to a selected group of people or systems. That group is authorized to access the systemโฆDec 22, 2020Dec 22, 2020
InInfoSec Write-upsbyMartin ThomaDOS via a billion laughs ๐Consume arbitrary much RAM by repeated referencingDec 23, 20201Dec 23, 20201
InFAUNโโโDeveloper Community ๐พbyMartin ThomaFull Disk Encryption ๐Keep your data private, even if you lose your deviceDec 28, 2020Dec 28, 2020
InInfoSec Write-upsbyMartin ThomaInsecure Deserialization ๐๐Serialization is the act of transforming objects from an internal representation to a stream of characters or bytes. Letโs hack!Jan 28, 2021Jan 28, 2021
InLevel Up CodingbyMartin ThomaDocker Security ๐A hands-on guide to security for DockerFeb 3, 2021Feb 3, 2021
InLevel Up CodingbyMartin ThomaCredential Stuffing ๐๐Credential stuffing is a brute-force attack on a servicesโ user accounts. Not one specific account, but many. Typically by usingโฆMar 11, 2021Mar 11, 2021
InPlain and SimplebyMartin ThomaMulti-Factor Authentication ๐Most websites only have one piece of evidence that is used to authenticate you: A password. However, having multiple pieces of evidenceโฆApr 27, 2021Apr 27, 2021