A public available website often has no authentication or even so called anonymous access. Well if there are no cookies, all information is public, then indeed. But in most cases the information is not public, and is even often linked...
Having a good understanding and effective implementation of authorization is paramount to have adequate control over your information. We will discuss some key principles, threats and what you can do to prevent these threats to materialize. Knowing who interacts with...
In this series we will learn how to build a restaurant reviewing application using the NoCode-X platform. Our application will allow users to add new restaurants and leave ratings and comments about them. In the first part we created a...
Yes, it looks good! Yes it works! But many people or developers don’t see the cyber security challenges of web applications. Businesses must be served and the business functionalities need to rock and roll. But cyber resilience is a...
In this series we will learn how to build a restaurant reviewing application using the NoCode-X platform. Our application will allow users to add new restaurants and leave ratings and comments about them. In the first part we will create...
A new Security vulnerability in detected in F5. And yes it is a 9.8/10 meaning trivial to exploit with maximum damage…. In other words all hell is breaking loose. The new F5 RCE vulnerability, CVE-2022-1388, is trivial to exploit. We...