InFAUN — Developer Community 🐾byMartin ThomaContent Security Policy (CSP) 😇In today’s digital landscape, web security threats have become increasingly sophisticated and pervasive. As our reliance on the internet…Apr 9, 2023Apr 9, 2023
InFAUN — Developer Community 🐾byMartin ThomaSQL InjectionsWhat they are, how to use them, and how to prevent themOct 12, 2020Oct 12, 2020
InLevel Up CodingbyMartin ThomaLeaking SecretsHow it happens and how you prevent itOct 13, 2020Oct 13, 2020
InLevel Up CodingbyMartin ThomaCross-site Scripting (XSS) 😈What it is, why it matters, how they are executed, how to prevent XSS attacks — and how to create a cookie stealer!Oct 16, 2020Oct 16, 2020
InInfoSec Write-upsbyMartin ThomaEmail Spoofing 😈Email spoofing is the creation of emails with a forged sender address. Faking the senders’ address is often a part of a phishing attack…Dec 2, 20201Dec 2, 20201
InPython in Plain EnglishbyMartin ThomaSoftware Composition Analysis (SCA)The job as a software developer is pretty crazy: You need to learn constantly about new technologies, understand topics within the domain…Dec 4, 20201Dec 4, 20201
InFAUN — Developer Community 🐾byMartin ThomaXXE attacks 😈PDF, Excel, SVG, ebooks — all use XML. They can be vulnerable.Dec 7, 2020Dec 7, 2020
InLevel Up CodingbyMartin ThomaEffective Access Control 😇Access control is the act of restricting access to a selected group of people or systems. That group is authorized to access the system…Dec 22, 2020Dec 22, 2020
InInfoSec Write-upsbyMartin ThomaDOS via a billion laughs 😈Consume arbitrary much RAM by repeated referencingDec 23, 20201Dec 23, 20201
InFAUN — Developer Community 🐾byMartin ThomaFull Disk Encryption 😇Keep your data private, even if you lose your deviceDec 28, 2020Dec 28, 2020
InInfoSec Write-upsbyMartin ThomaInsecure Deserialization 😈🐝Serialization is the act of transforming objects from an internal representation to a stream of characters or bytes. Let’s hack!Jan 28, 2021Jan 28, 2021
InLevel Up CodingbyMartin ThomaDocker Security 😇A hands-on guide to security for DockerFeb 3, 2021Feb 3, 2021
InLevel Up CodingbyMartin ThomaCredential Stuffing 😈🐝Credential stuffing is a brute-force attack on a services’ user accounts. Not one specific account, but many. Typically by using…Mar 11, 2021Mar 11, 2021
InPlain and SimplebyMartin ThomaMulti-Factor Authentication 😇Most websites only have one piece of evidence that is used to authenticate you: A password. However, having multiple pieces of evidence…Apr 27, 2021Apr 27, 2021