Presenting how to use X-Forwarded-For HTTP header in a practical way. Describing security risks and best practices.
Application Security
Presenting how to use X-Forwarded-For HTTP header in a practical way. Describing security risks and best practices.
Introduction Artificial Intelligence (AI) has become one of the hottest topics in IT, especially since the public release of ChatGPT. For many, AI is the future of modern technology, which will speed up work and solve various challenges automatically. For others, particularly skeptics, AI (especially LLM-based AI) is viewed as…
Explaining one of the most common web API vulnerability classes — Broken Function Level Authorization in a practical manner. Providing a case study example based on the Damn Vulnerable RESTaurant API, including methods for identifying and preventing these vulnerabilities.
Presenting an Unrestricted Resource Consumption vulnerability class using a password reset feature as an example.
Broken Object Property Level presented in a practical way with methods for identifying and preventing vulnerabilities based on OWASP.
Explaining one of the most common web API vulnerability classes - Broken Authentication in a practical manner. Providing a case study example based on the Damn Vulnerable RESTaurant API, including methods for identifying and preventing these vulnerabilities.
Explaining one of the most common web API vulnerability classes - Broken Object Level Authorization in a practical manner. Providing a case study example based on the Damn Vulnerable RESTaurant API, including methods for identifying and preventing these vulnerabilities.
Introduction to a security code challenge dedicated to developers and ethical hackers. This challenge focuses on identifying and fixing web API security vulnerabilities in a Python FastAPI-based restaurant API.
At the beginning of 2023 Google released an open-source Software Composition Analysis tool — osv-scanner. In this article I'm presenting how it can be configured and utilised using popular open-source projects as examples.
Does DevSecOps Engineer need programming skills? What is the value of utilising Python for security purposes? What you need to learn to automate security at scale? This article will answer these questions.