#bugbounty
Read more stories on Hashnode
Articles with this tag
JSON Web Tokens (JWTs) are widely used to transfer security critical information between parties, as they can guarantee data integrity. However, it is...
If you're using UUIDs (version 1) to implement security features in your application, you may be vulnerable to Sandwich Attacks. Solution: switch to...
A story about how I hacked a US airline with the help of Youtube ✈️🔓🎥
Are you safeguarding💂 your web app against HTTP Parameter Pollution (HPP)? Discover the silent danger☠️ in today's comic.
Ever wondered how attackers carry out dependency confusion 🤔 attacks?
Discovering credentials on a developer's machine is like stumbling upon a goldmine 🧈. Here are eight crucial locations on a Unix-type machine where...