Toggle Side Panel

  • Learn
    • 🧪 Labs
    • Learning Paths
    • CybrBits
    • All Courses
    • CloudSec.Cybr
  • Community
    • Join Discord
    • Newsfeed
    • Discussions
    • Contact & Support
  • Resources
    • Blog
    • Ebooks
    • Podcasts
    • Webinars
  • Pricing
  • For Teams
More options
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Learn
      • 🧪 Labs
      • Learning Paths
      • CybrBits
      • All Courses
      • CloudSec.Cybr
    • Community
      • Join Discord
      • Newsfeed
      • Discussions
      • Contact & Support
    • Resources
      • Blog
      • Ebooks
      • Podcasts
      • Webinars
    • Pricing
    • For Teams
    Sign in Sign up
    Close search

    Tag: Application Security

    Posts, tutorials, and general information about Application Security.

    Request Forgeries for the Security+

    Request forgeries (CSRF, XSRF, SSRF)

    In 2020, CheckPoint Research announced multiple vulnerabilities in the popular social media application named TikTok. One of the found vulnerabilities allowed an attacker to delete…

    christophe
    Christophe September 1, 2023
    0 Comments
    Directory / Path traversal for the Security+

    Directory / Path Traversal

    Just like you have directories on your PC, laptop, and mobile phones, web servers also have directories. For example, if you were to purchase web…

    christophe
    Christophe August 29, 2023
    0 Comments
    Cybr's HashiCorp Vault Cheat Sheet Banner

    HashiCorp Vault [Cheat Sheet]

    We wrote a blog post introducing and explaining what Vault is, when it’s useful, and how to get started using it to manage your secrets.…

    christophe
    Christophe August 25, 2023
    0 Comments
    GUI-Vil AWS Cryptojacking attacj case study

    How crypto miners hijack AWS accounts (Cryptojacking GUI-Vil Case Study)

    This is the story of how you print free money. It’s a story that involves an AWS account, a threat actor named GUI-Vil, and unauthorized…

    christophe
    Christophe August 11, 2023
    0 Comments
    Running SAST tooling

    Static Application Security Testing (SAST)

    What if you could take multiple senior developers and security experts, distill them into a tool, and then have the ability to run that tool…

    christophe
    Christophe July 7, 2023
    1 Comment
    AWS WAF getting started guide

    AWS WAF Made Simple: Protect Your Web Apps In The Cloud

    AWS built its own Web Application Firewall and named the service AWS WAF, and we’re going to take a detailed look at how we can…

    christophe
    Christophe June 13, 2023
    0 Comments
    HashiCorp Vault Explained

    What is HashiCorp Vault and why should you know about it?

    Vault is an open-source secrets management tool used to automate access to secrets, data, and systems. This blog post comes from our Explained in 180…

    christophe
    Christophe May 8, 2023
    0 Comments
    Hashing use cases

    Hashing use cases

    In practice, what is hashing used for? How is it being used in the real world? Let’s take a look at a few common hashing…

    christophe
    Christophe July 18, 2022
    0 Comments
    Multi-Factor Authentication factors and attributes banner

    Multifactor authentication (MFA) factors and attributes

    Password-based authentication has been proven time and time again to be a vulnerable form of authentication. One of the best defenses is using Multifactor Authentication,…

    christophe
    Christophe July 3, 2022
    0 Comments
    Banner for plaintext versus encrypted versus hashed passwords

    Encrypted versus hashed passwords. What’s the difference?

    As you study for the CompTIA Security+ exam, it’s important that you understand the differences between plaintext, encrypted, and hashed passwords. It’s common to hear…

    christophe
    Christophe June 25, 2022
    0 Comments
    Load More
    Cybr logo badge
    © 2026 - Cybr, Inc
    • About
    • Contact
    • Courses
    • Terms of Service
    • Privacy Policy

    Report

    There was a problem reporting this post.

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts

    Please allow a few minutes for this process to complete.

    Report

    You have already reported this .