Category "security"

Best way to protect sensitive information copying in HTML?

The company I work for has a requirement to protect some area where articles are rendered, I've implemented some procedures to protect web-scraping but the prob

Thales HSM Import Public Key (EO) error '04'

I am sending this command with a DER encoded public RSA key. 1234EO013082010a02820101ec7b6d6be7d0603e3f247c22dd0ae533f02f1216fd9099d6ec5c596eb92c95e8ee87e3437af

How worried should I be about opening up a JWT to an XSS vulnerability?

I am building a node.js web application with react for the the GUI and graphQL served with Apollo for the back-end connecting to a RDS (MySQL) instance on AWS.

How to choose a specific CIS ruleset with AWS Inspector

In AWS Inspector Classic I want to scan an Amazon Linux 2 based EC2 image against the ruleset for CIS Benchmarks Amazon Linux 2. The AMI has been hardened to th

In flutter, which is more secure using platform functions/ dependency or dart dependency?

Im building a mobile application with flutter which the security is the highest priority so what is more secure to use native code (functions/ dependency ) or u

How to hide my security features in wordpress

How can I hide the power to see wp-includes from my wordpress website, try the Hide My WP-WordPress Security plugin and it totally ruins my website, someone who

GKE Cluster Audit

What are the points to be reviewed while auditing a GKE cluster? We have a production cluster and I would like to what all points need to be reviewed while audi

Return fingerprint and save in firebase

I am trying to write an app using flutter or android studio. The user will login to the app using his fingerprint. I want to read the fingerprint and save it in

Error with ruby version on termux when I try to install metasploit

I was installing metasploit with termux and it said: termux output ~ $ ls <br> metasploit-framework storage wiki-termux<br> ~ $ cd metasploit-fram

Is it safe to use uid to store data in firebase database? [duplicate]

I plan on creating an application on flutter that uses firebase auth and cloud firestore. My plan is to create a user and the use the user's u

Blazor WebAssembly Application fails to load due to integrity errors

We have developed a Blazor WebAssembly Application that has already gone into productive usage for a certain group of customers. The Application works well in a

Spring Security 5 sha256 encoder

I have a problem with Spring Security 5 Basic authentication. I've configured Spring like this: @Configuration public class SecurityConfig extends WebS

MobSF: Solve @rpath violation

We tested one of our iOS app with MobSF and the report highlighted that the binary has Runpath Search Path (@rpath) set. In certain cases an attacker can abuse

Security & Pyscript

I am coding a Python editor, which can execute python codes and returns the output. My initial idea was to code a backend service for it, that will run the Pyth

XSS attack still works despite htmlspecialchars() doing its work

hi i am trying to filter outputs of users who will put free text and wanna prevent XSS attacks so i tried this function i made to check <?php $patterns = [

How to add the username and passwords to a request in java spring

I'm currently trying to add security to my spring application and just want to know how can i add the credentials to the request so that it has the security acc

Bitbucket: Show value of variables marked as secret

For one of my repos I need to see the value I set to a secure property of a deployment (created as described in https://support.atlassian.com/bitbucket-cloud/do

Is there a way to prevent basic auth from popping inside iframe other than white list?

I'm looking for a way to forbid basic auth from popping inside an iframe and the only option I see is the creation of a white list inside the CSP but it doesn't

Handling the token expiration in fastapi

I'm new with fastapi security and I'm trying to implement the authentication thing and then use scopes. The problem is that I'm setting an expiration time for t

Safe regex patterns from ReDos attack

I've recently faced with some redos attack issues. Explain in simple steps: Regex denial of services: it means the attacker can put some malicious/crafted input