search

So let’s make the assumption you’re in tech already and want to change streams to cyber, where do you begin!

Bharat Dwarkani shared on Mar 15, 2020
image
towardsdatascience.com
bookmarks
share
favorite_border0 visibility6
favorite_border0 visibility6 share bookmarks

JSON web tokens are a type of access tokens that are widely used in commercial applications. They are based on the JSON format and includes a token signature to ensure the integrity of the token. Today, we are going to talk about the security implications of using JSON web tokens (and signature-based tokens in general), and how they can be exploited by attackers to bypass access control.

Bharat Dwarkani shared on Mar 12, 2020
image
link.medium.com
bookmarks
share
favorite_border0 visibility12
favorite_border0 visibility12 share bookmarks

Regex is everywhere on the Internet nowadays. Downing Servers With Evil Regular Expressions. But can regex also lead to vulnerabilities? Today, let’s explore how attackers can exploit poorly…

Bharat Dwarkani shared on Mar 12, 2020
image
link.medium.com
bookmarks
share
favorite_border0 visibility7
favorite_border0 visibility7 share bookmarks
add