Resources

Web Security

Web Security

Second wave of Shai-Hulud npm worm compromises the global software supply chain

Web Security

The dangers of incorrect CSP implementations

Web Security

Pros and Cons of DNS Over HTTPS

Web Security

Netsparker's Web Security Scan Statistics for 2018

Web Security

The Dangers of Open Git Folders

Web Security

NoScript Vulnerability in Tor Browser

Web Security

Analyzing Impact of WWW Subdomain on Cookie Security

Web Security

Sven Morgenroth Talks About PHP Type Juggling on Paul's Security Weekly Podcast

Web Security

Vulnerability Assessments and Penetration Tests – What's the Difference?