Check out our newest BLOG! "How to implement validation with captcha" by our own David Moreira! .NET Developers will find this very interesting and useful for their work with .NET and Blazor tech as we learn new things every day! https://lnkd.in/dPWvC3Wv #blazor #components #blazorise #dotnet #csharpdotnet #programming #opensource #development
Blazorise’s Post
More Relevant Posts
-
🚀 7 Proven Techniques to Bolster the Security of Your Rust WASM Modules 🛡️ In my latest article, I dive deep into the best practices for securing your Rust WASM modules. Here’s a glimpse of what you’ll learn: - Module Isolation: Keep your modules separate to prevent unauthorized memory access and mitigate exploits. - Code Integrity: Validate your WASM binary to avoid code injection and ensure trusted execution. - Control Flow Integrity: Prevent arbitrary control transfers to thwart code injection and ROP attacks. - And more! By applying these and the other techniques, you can guard your WASM modules against potential attacks and provide a secure, reliable experience for your users. Curious to know more? Check out the full article below #WebDevelopment #WASM #RustLang #CyberSecurity #WebSecurity #TechTrends #Programming
7 ways I learned to improve the security of a WASM module in Rust
blog.devgenius.io
To view or add a comment, sign in
-
Using Kick Assembler And VS Code To Write C64 Assembler https://lnkd.in/e2i634Qv #Infosec #Security #Cybersecurity #CeptBiro #KickAssembler #VSCode #C64Assembler
Using Kick Assembler And VS Code To Write C64 Assembler
https://hackaday.com
To view or add a comment, sign in
-
Openfire 4.8.0 Code Injection #shreateh #exploit #hacker #computer #cybersecurity #blackleaders #technology #vulnerability #vulnerabilityisstrength #vulnerable #infosec #security #tech #hacking #programming #hackers #coding #safety #cybersec
Openfire 4.8.0 Code Injection
khalil-shreateh.com
To view or add a comment, sign in
-
Delphi developers, are you confident your applications are fortified against cyber threats? In our latest video, we demonstrate how DerScanner can be your secret weapon for safeguarding your Delphi code. By simply providing a link to your repository or local source code, DerScanner scans your code for SQL injections, weak encryption, hardcoded credentials, and more. It's like a security audit at your fingertips! But that's not all – DerScanner is currently working on integrating with RAD Studio, promising to streamline your Delphi development workflow even further. Watch the video to see DerScanner in action: https://lnkd.in/dcFmFtUf hashtag #DerScanner #Delphi #AppSecurity #Cybersecurity #SoftwareDevelopment
Delphi Static Code Analysis with DerScanner
https://www.youtube.com/
To view or add a comment, sign in
-
Check out our last video about Delphi apps security testing.
Fractional CMO/Head of PMM | Cybersecurity | Product Mindset | SaaS | AppSec | Cloud | Growth | 15 years exp
Delphi developers, are you confident your applications are fortified against cyber threats? In our latest video, we demonstrate how DerScanner can be your secret weapon for safeguarding your Delphi code. By simply providing a link to your repository or local source code, DerScanner scans your code for SQL injections, weak encryption, hardcoded credentials, and more. It's like a security audit at your fingertips! But that's not all – DerScanner is currently working on integrating with RAD Studio, promising to streamline your Delphi development workflow even further. Watch the video to see DerScanner in action: https://lnkd.in/dcFmFtUf hashtag #DerScanner #Delphi #AppSecurity #Cybersecurity #SoftwareDevelopment
Delphi Static Code Analysis with DerScanner
https://www.youtube.com/
To view or add a comment, sign in
-
Hello fellows! We keep bringing you good news. We added a new diagnostic rule for C and C++, V1109 - https://lnkd.in/exmesGeM This rule detects calls to deprecated functions that may be non-supported or deleted in later library versions. Why is it important? Using deprecated functions may cause unexpected behavior, errors, and even security vulnerabilities. But don't worry! Our new diagnostic rule helps you find and replace them with modern analogs. Let's say, you use the CryptQueryObject function from the wincrypt.h WinAPI header file. The analyzer will indicate that it's marked as deprecated and suggest replacing it. It's simple and efficient! Now the diagnostic rule covers functions from WinAPI and GLib libraries, and we're constantly enhancing its capabilitites. Ready to try new option? Use the promo code: https://lnkd.in/eZp7UmtP. Share your thoughts in the comments. #cpp #programming
To view or add a comment, sign in
-
Openfire 4.8.0 Code Injection #shreateh #exploit #hacker #computer #cybersecurity #blackleaders #technology #vulnerability #vulnerabilityisstrength #vulnerable #infosec #security #tech #hacking #programming #hackers #coding #safety #cybersec
Openfire 4.8.0 Code Injection
khalil-shreateh.com
To view or add a comment, sign in
-
Start learning reverse engineering with basic x64 buffer overflow theory:
In this blog post I go over x86-64 (64-bit) buffer overflow theory. All you need is basic knowledge of C and Linux, GCC to compile, and familiarity with GDB for debugging. The program has an insecure STRCPY C function that allows us to exceed the allocated space from a user input so we can spill over into other memory registers and execute malicious shell code. https://lnkd.in/e839rYyy #penetrationtesting #programming #cybersecurity #reverseengineering #hacking
x64 Buffer Overflow Theory — Cyber Wired Training
cyberwiredtraining.net
To view or add a comment, sign in
-
Another great module by HTB, learned everything from, PATH abuse, Escaping Restricted Shells, SGID & SUID manipulation, Sudo rights abuse, cron job abuse, lograte manipulation, kernel exploits, crafting custom shared libraries with real library passthrough for obfuscation, shared object hijacking, python library hijacking, polkit abuse and the standard Kernel Exploits. Also set myself an additional task at the end of the module to gain persistence which I did.
Completed Linux Privilege Escalation
academy.hackthebox.com
To view or add a comment, sign in
-
CppCon, The C++ Conference 2024, Sept 15th-20th, Aurora, Colorado, USA Max Hoffmann: "Security Beyond Memory Safety - Using Modern C++ to Avoid Vulnerabilities by Design" Nowadays, there is one topic that comes up in virtually all discussions on system programming languages: memory safety. However, even though memory safety rules out many of the most common sources of vulnerabilities, there are still plenty of ways how a vulnerability may find its way into the codebase. https://lnkd.in/gAk_-3FD cppcon2024.sched.com cppcon.org/registration cppcon.org/lodging #Cpp #CPlusPlus
CppCon 2024: Security Beyond Memory Safety - Using Mo...
cppcon2024.sched.com
To view or add a comment, sign in
2,684 followers