排序
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant,As developers, we're constantly juggling features, fixes, and deadlines. Yet, a ...
A denial of service Regex breaks FastAPI security
A denial of service Regex breaks FastAPI security,Welcome, fellow developers! In this blog post, we are going to delve deep into the world of application security, specifically foc...
How to secure Python Flask applications
How to secure Python Flask applications,Flask is a powerful, lightweight, and versatile web framework for Python, that's designed to make it easy for developers to develop web appl...
Symmetric vs. asymmetric encryption: Practical Python examples
Symmetric vs. asymmetric encryption: Practical Python examples,Symmetric and asymmetric encryption are the two most common ways to protect sensitive data with cryptography. These m...
How to install Java on macOS
How to install Java on macOS, What is Java? Java is a high-level, class-based, object-oriented programming language that was designed to have as few implementation dependencies as ...
Handling security vulnerabilities in Spring Boot
Handling security vulnerabilities in Spring Boot,In the world of software development, managing dependencies is a core part of creating strong and secure applications. Spring Boot,...
Finding and fixing insecure direct object references in Python
Finding and fixing insecure direct object references in Python,An insecure direct object reference (IDOR) is a security vulnerability that occurs when a system’s implementation al...
How to perform JavaBeans Validation
How to perform JavaBeans Validation,JavaBeans Validation (Bean Validation) is a validation model available since the introduction of the Java Enterprise Edition 6 platform. It prov...
How to prevent XPath injection attacks
How to prevent XPath injection attacks,Web applications are vulnerable to several kinds of attacks, but they’re particularly susceptible to code injection attacks. One such attack...
The SecurityManager is getting removed in Java: What that means for you
The SecurityManager is getting removed in Java: What that means for you,The Java Development Kit (JDK) library's java.security package is one of the most important packages, yet de...
How to create SBOMs in Java with Maven and Gradle
How to create SBOMs in Java with Maven and Gradle,When building applications in Java, we highly depend on external libraries and frameworks. And each Java package that is imported ...
A Talk About Java Serialization and Deserialization
A Talk About Java Serialization and Deserialization, Preface The current popularity of Java security can be said to be a must-know for the red team. I once fell into the beginning ...