I have compiled a list of possible techniques attackers use to exploit vulnerabilities in your system. As a web developer, it is good to be mindful of the common patterns and follow the best practices to guard against the attacks.
[Read More]
I have compiled a list of possible techniques attackers use to exploit vulnerabilities in your system. As a web developer, it is good to be mindful of the common patterns and follow the best practices to guard against the attacks.
[Read More]Tabnabbing is an outdated technique that was used by attackers to distract the trapped users and get them to share sensitive information. Most of the modern browsers now have protection in place that has made this attack almost non-existent.
[Read More]Privilege Escalation is a vulnerability in which a user of the system could “escalate” themselves to a higher-privileged role, such as admin, through some loophole in the backend code. Taking Node.js example, let’s see how it could be done, and what are the best practices to avoid it.
[Read More]