Sentinel: Hackers Trail | Chapter teasers
Every chapter of the book includes a Limerick, Naani Poem, Quatrain, or Proverb - at the start, can you decipher the story from them?
Understanding Digital Signatures: More Than Just a Hash
Digital signatures are a cornerstone of modern security practices, ensuring data integrity and authentication in various online communications. But there&
Why PASETO Might Not Be the JWT Replacement We Hoped For
PASETO, a potential alternative to JWT, has sparked conversations within the security and developer community alike (for once).
While PASETO
Unveiling the Myths of Multi-Factor Authentication
MFA refresher
Multi-Factor Authentication (MFA) is a security practice that requires users to provide two or more distinct authentication factors
Unlocking Your Tech Success - 5 Essential Lessons
Ever wondered what it takes to thrive in the tech world, not just as a coder but as a tech-savvy
Forget DevSecOps and ShiftLeft
🪄Integrating Security Seamlessly
In this article, we're about to spill the beans on why this approach rocks, answer
Hawk Authentication bug - Firefox Accounts payload bypassing integrity validation
HawkAuth protocol is widely adopted by Firefox Accounts and appears in Postman in a very short list of supported API
The Imperative of Persistent CSRF Tokens (Video)
A brief on Cross-Site Request Forgery
Cross-Site Request Forgery (CSRF) attacks, capable of duping a user into performing an unintended
JWT: A Cryptographic Love Story with Security, Vulnerabilities, and a State of Confusion
Folks, remember to be careful with your JWTs. Use strong cryptographic algorithms, manage those secret keys like they're
Certificate Pinning is powerful, but you probably shouldn't use it
Let's be clear about Certificate Pinning.
It IS extremely useful.
It IS valid, if you follow 1 rule,