mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

7.6K
active users

#WebAppSecurity

0 posts0 participants0 posts today
LMG Security<p>AI-powered features are the new attack surface! Check out our new blog in which LMG Security’s Senior Penetration Tester Emily Gosney <span class="h-card" translate="no"><a href="https://infosec.exchange/@baybedoll" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>baybedoll</span></a></span> shares real-world strategies for testing AI-driven web apps against the latest prompt injection threats.</p><p>From content smuggling to prompt splitting, attackers are using natural language to manipulate AI systems. Learn the top techniques—and why your web app pen test must include prompt injection testing to defend against today’s AI-driven threats.</p><p>Read now: <a href="https://www.lmgsecurity.com/are-your-ai-backed-web-apps-secure-why-prompt-injection-testing-belongs-in-every-web-app-pen-test/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/are-your-ai-ba</span><span class="invisible">cked-web-apps-secure-why-prompt-injection-testing-belongs-in-every-web-app-pen-test/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/LLMvulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMvulnerabilities</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>🌐 The Digital Terrain Is Shifting — Are Your Apps and APIs Ready?</p><p>As AI adoption accelerates, so do AI-driven attacks.<br>In their new research report, Akamai Technologies uncovers the evolving threats facing web applications and APIs — and how organizations can respond before attackers get ahead.</p><p>State of Apps and API Security 2025: How <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> Is Shifting the Digital Terrain explores the sharp rise in automated, intelligent threats — and the new defenses emerging to meet them.</p><p>📥 Download the full report here: <a href="https://itspm.ag/akamaixmwd" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">itspm.ag/akamaixmwd</span><span class="invisible"></span></a><br>📌 Research like this helps <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> professionals, <a href="https://infosec.exchange/tags/leaders" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>leaders</span></a>, and <a href="https://infosec.exchange/tags/developers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developers</span></a> stay ahead of the curve — and shape the future of <a href="https://infosec.exchange/tags/digital" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digital</span></a> defense.</p><p>🎙️ We’re also proud to feature Akamai in our RSAC 2025 coverage — with a Brand Story recorded pre-event and a follow-up conversation happening on location at the conference in San Francisco with Rupesh Chokshi, Sean Martin, CISSP, and Marco Ciappelli.</p><p>Watch the pre-event recording here: <a href="https://youtu.be/DMm6INJ_2Z8" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/DMm6INJ_2Z8</span><span class="invisible"></span></a> </p><p>🙏 A huge thank you to the Akamai team for sponsoring our coverage and sharing their insights with our global audience.</p><p>👇 Check out the report and stay tuned for more from RSAC:</p><p>📥 Download the Report: <a href="https://itspm.ag/akamaixmwd" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">itspm.ag/akamaixmwd</span><span class="invisible"></span></a><br>🌐 Explore our RSAC 2025 Coverage: <a href="https://www.itspmagazine.com/events/rsac-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/events/rsac-2</span><span class="invisible">025</span></a></p><p><a href="https://infosec.exchange/tags/akamai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>akamai</span></a> <a href="https://infosec.exchange/tags/rsac2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsac2025</span></a> <a href="https://infosec.exchange/tags/brandstory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>brandstory</span></a> <a href="https://infosec.exchange/tags/apigateway" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apigateway</span></a> <a href="https://infosec.exchange/tags/applicationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>applicationsecurity</span></a> <a href="https://infosec.exchange/tags/aiinsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aiinsecurity</span></a> <a href="https://infosec.exchange/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityresearch</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devsecops</span></a> <a href="https://infosec.exchange/tags/digitaldefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitaldefense</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/itspmagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itspmagazine</span></a> <a href="https://infosec.exchange/tags/rsaconference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsaconference</span></a> <a href="https://infosec.exchange/tags/apisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apisecurity</span></a> <a href="https://infosec.exchange/tags/aiattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aiattacks</span></a> <a href="https://infosec.exchange/tags/securityreport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityreport</span></a> <a href="https://infosec.exchange/tags/cybersecurityinnovation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityinnovation</span></a> <a href="https://infosec.exchange/tags/securitystrategy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitystrategy</span></a> <a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a></p>
Cyberkid<p>Top Web Application PenTesting Tools by Category ⚔️</p><p>🔖Hashtags:<br><a href="https://defcon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebSecurity</span></a> <a href="https://defcon.social/tags/PentestingTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PentestingTools</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://defcon.social/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://defcon.social/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://defcon.social/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p><p>⚠️Disclaimer:<br>This content is for educational purposes only. Only use these tools in environments where you have proper authorization. Hacking without permission is illegal and unethical.</p>
LMG Security<p>Are Your Web Apps an Open Door for Hackers?</p><p>Imagine spending months perfecting your web app, only to find it leaking data like a sieve. Scary, right? That’s exactly what happens when common security flaws go unchecked.</p><p>In LMG Security’s latest blog, <span class="h-card" translate="no"><a href="https://infosec.exchange/@tompohl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tompohl</span></a></span> shares jaw-dropping real-world web application security attack case studies from the field, including:</p><p>▪ Command Injection Jackpot – A hidden file upload flaw led to full server control.<br>▪ API Admin Takeover – An overlooked endpoint allowed attackers to create Super Admin accounts.<br>▪ Heap Dump Disaster – A debugging tool exposed Active Directory credentials and user tokens<br>.<br>Read the full blog to learn how hackers target web apps and how to lock them down: <a href="https://www.lmgsecurity.com/common-web-application-security-attacks-real-world-lessons-from-the-field/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/common-web-app</span><span class="invisible">lication-security-attacks-real-world-lessons-from-the-field/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <br><a href="https://infosec.exchange/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://infosec.exchange/tags/APISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APISecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/WebApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebApp</span></a> <a href="https://infosec.exchange/tags/WebApplication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebApplication</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetrationtesting</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Chris Brooking<p>I'm not going to say what site this is, but it has to qualify for the Web Security wall of shame.</p><p><a href="https://mastodonapp.uk/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://mastodonapp.uk/tags/badpassword" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>badpassword</span></a> <a href="https://mastodonapp.uk/tags/insecurewebsite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>insecurewebsite</span></a> <a href="https://mastodonapp.uk/tags/funny" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>funny</span></a></p>
LaemenPang<p><span class="h-card" translate="no"><a href="https://mastodon.ie/@EugeneMcParland" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>EugeneMcParland</span></a></span> If I wasn't 60 years old and <a href="https://mastodon.social/tags/Neurodivergent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Neurodivergent</span></a> I would be there in a <a href="https://mastodon.social/tags/Heartbeat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Heartbeat</span></a> 2 decades <a href="https://mastodon.social/tags/usaf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>usaf</span></a> <br><a href="https://mastodon.social/tags/comsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>comsec</span></a> <a href="https://mastodon.social/tags/tactical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tactical</span></a> <a href="https://mastodon.social/tags/combat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>combat</span></a> <a href="https://mastodon.social/tags/communication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>communication</span></a> <a href="https://mastodon.social/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://mastodon.social/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://mastodon.social/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://mastodon.social/tags/cook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cook</span></a> <br><a href="https://mastodon.social/tags/commitment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>commitment</span></a> I am going look up <a href="https://mastodon.social/tags/UkraineJenny" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UkraineJenny</span></a></p>
LMG Security<p>Why invest in web app security assessments along with your Penetration Testing? With nearly 1 in 10 breaches stemming from basic web app attacks, the stakes are high. LMG Security’s CTO Dan Featherman breaks down how these assessments can close security gaps and reduce risk. <a href="https://www.lmgsecurity.com/why-web-application-security-assessments-should-move-up-your-to-do-list/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/why-web-applic</span><span class="invisible">ation-security-assessments-should-move-up-your-to-do-list/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Bill Loguidice<p>Get protected with this Cybersecurity Month Mega Bundle of great book! <a href="https://techhub.social/tags/sale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sale</span></a> <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://techhub.social/tags/book" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>book</span></a> <a href="https://techhub.social/tags/books" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>books</span></a> <a href="https://techhub.social/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://techhub.social/tags/data" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>data</span></a></p><p><a href="https://fullsteamahead365.com/2024/09/30/cybersecurity-month-mega-book-bundle/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fullsteamahead365.com/2024/09/</span><span class="invisible">30/cybersecurity-month-mega-book-bundle/</span></a></p>
Kevin Sullivan<p>A new critical security flaw (CVE-2024-4577) affecting all versions of PHP on Windows has been disclosed. This CGI argument injection vulnerability allows remote code execution by bypassing protections from a previous flaw (CVE-2012-1823).</p><p>Key Points:</p><p>- Impacts all PHP versions on Windows<br>- Allows argument injection and remote code execution<br>- Bypasses previous CVE-2012-1823 protections<br>- Affects XAMPP installations with specific locales by default<br>- Patches available in PHP 8.3.8, 8.2.20, and 8.1.29</p><p>Admins are urged to update <a href="https://techhub.social/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> immediately as exploitation attempts have already been detected. Switching to more secure solutions like Mod-PHP, FastCGI, or PHP-FPM is also recommended.</p><p>This simple yet critical bug highlights the importance of thorough security reviews and timely patching.</p><p><a href="https://techhub.social/tags/PHPSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHPSecurity</span></a> <a href="https://techhub.social/tags/CVE20244577" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE20244577</span></a> <a href="https://techhub.social/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://techhub.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://techhub.social/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://techhub.social/tags/WindowsOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsOS</span></a> <a href="https://techhub.social/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a></p><p>HackerNews: <a href="https://thehackernews.com/2024/06/new-php-vulnerability-exposes-windows.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2024/06/new-</span><span class="invisible">php-vulnerability-exposes-windows.html</span></a></p>
ZeroThreat<p>🚀Introducing World's Most Intelligent Web App &amp; API Security Scan Platform - <a href="https://infosec.exchange/tags/ZeroThreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroThreat</span></a>!</p><p>Scan your web app &amp; API 5x faster with near-zero false positives, offering unparalleled protection without complexity.</p><p>Get Free Access at <a href="https://zerothreat.ai" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">zerothreat.ai</span><span class="invisible"></span></a> with NO Configuration.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/apisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apisecurity</span></a> <a href="https://infosec.exchange/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a></p>
Joseph Zeng<p>Fuzzing AWS WAF with Selenium</p><p><a href="https://sysdig.com/blog/fuzzing-and-bypassing-the-aws-waf/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sysdig.com/blog/fuzzing-and-by</span><span class="invisible">passing-the-aws-waf/</span></a></p><p><a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/evasion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>evasion</span></a> <a href="https://infosec.exchange/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://infosec.exchange/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetrationtesting</span></a></p><p>Edit: removed POC script 😁</p>
Brian Vermeer<p>💻 Are you a Java developer concerned about XSS vulnerabilities in your web apps? Learn to prevent XSS attacks using Snyk Code. Knowledge is power, empower yourself 👉 <a href="https://buff.ly/3Hi6WEh" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/3Hi6WEh</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://mastodon.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://mastodon.social/tags/Java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Java</span></a> <a href="https://mastodon.social/tags/SnykCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SnykCode</span></a></p>
Brian Vermeer<p>🔒 Write safer HTML pages for your Java web applications. Understand the potential security risks associated with XSS attacks and how to use Snyk Code to prevent them. Detailed insights here 👉 <a href="https://buff.ly/3Hi6WEh" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/3Hi6WEh</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://mastodon.social/tags/Java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Java</span></a> <a href="https://mastodon.social/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://mastodon.social/tags/SnykCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SnykCode</span></a></p>
Indusface<p>👉 We are glad to announce the addition of a new feature to Indusface WAS - "Guided Authenticated / Gray Box Scans."<br> <br>The addition of this feature allows you to run authenticated / gray box scans by:</p><p>- Enabling you to easily record a set of login actions for complex multi-step forms.</p><p>- Uploading the recorded actions on the WAS portal for the scanner to imitate the human actions and perform authenticated scans</p><p>To understand more: <a href="https://youtu.be/1qA06N-AOHM?si=jTqniaRz6BacW_ec" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/1qA06N-AOHM?si=jTqnia</span><span class="invisible">Rz6BacW_ec</span></a></p><p><a href="https://infosec.exchange/tags/graybox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>graybox</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/dast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dast</span></a> <a href="https://infosec.exchange/tags/webapplicationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapplicationsecurity</span></a> <a href="https://infosec.exchange/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://infosec.exchange/tags/applicationscanning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>applicationscanning</span></a> <a href="https://infosec.exchange/tags/securitytesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitytesting</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/indusface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indusface</span></a> <a href="https://infosec.exchange/tags/indusfacewas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indusfacewas</span></a></p>
Indusface<p>"Not just any other WAF with some rules, but a fully managed offering of accurate WAF policies based on application risks."</p><p>That's what one of our customers appreciates about AppTrana WAF/WAAP.</p><p>Read the full review: <a href="https://bityl.co/L1FO" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bityl.co/L1FO</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/applicationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>applicationsecurity</span></a> <a href="https://infosec.exchange/tags/waf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>waf</span></a> <a href="https://infosec.exchange/tags/waap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>waap</span></a> <a href="https://infosec.exchange/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://infosec.exchange/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/apptrana" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apptrana</span></a> <a href="https://infosec.exchange/tags/indusface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indusface</span></a></p>
Tedi Heriyanto<p>Ten ways to exploit JWT: <a href="https://medium.com/@musab_alharany/10-ways-to-exploit-json-web-token-jwt-ac5f4efbc41b" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@musab_alharany/10-</span><span class="invisible">ways-to-exploit-json-web-token-jwt-ac5f4efbc41b</span></a></p><p><a href="https://infosec.exchange/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://infosec.exchange/tags/jwt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jwt</span></a></p>
Puzzle ITC<p>Am Di, 5. Sept. um 11 Uhr: TechKafi <a href="https://mstdn.social/tags/ruby" class="mention hashtag" rel="tag">#<span>ruby</span></a> ☕ - Web Security Refresh! 🚀</p><p>Buzzwords wie SQL Injection, XSS, CSRF, CSP sind uns bekannt, aber kennen wir wirklich alle Abwehrstrategien? Pascal Zumkehr bringt Licht ins Dunkel und erklärt Sicherheitslücken von Webapps samt Gegenmaßnahmen. Der Code ist in Ruby, doch die Lösungen gelten branchenweit.</p><p><a href="https://www.puzzle.ch/de/blog/articles/2023/08/29/tech-kafi-ruby-web-security-refresher" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">puzzle.ch/de/blog/articles/202</span><span class="invisible">3/08/29/tech-kafi-ruby-web-security-refresher</span></a></p><p><a href="https://mstdn.social/tags/WebSecurity" class="mention hashtag" rel="tag">#<span>WebSecurity</span></a> <a href="https://mstdn.social/tags/Ruby" class="mention hashtag" rel="tag">#<span>Ruby</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="tag">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/WebAppSecurity" class="mention hashtag" rel="tag">#<span>WebAppSecurity</span></a> <a href="https://mstdn.social/tags/TechEvent" class="mention hashtag" rel="tag">#<span>TechEvent</span></a> <a href="https://mstdn.social/tags/SecurityRefresh" class="mention hashtag" rel="tag">#<span>SecurityRefresh</span></a> <a href="https://mstdn.social/tags/PuzzleEvents" class="mention hashtag" rel="tag">#<span>PuzzleEvents</span></a> <a href="https://mstdn.social/tags/TechTalk" class="mention hashtag" rel="tag">#<span>TechTalk</span></a> <a href="https://mstdn.social/tags/WebDev" class="mention hashtag" rel="tag">#<span>WebDev</span></a> <a href="https://mstdn.social/tags/Coding" class="mention hashtag" rel="tag">#<span>Coding</span></a></p>
F0rm4t<p>🔐 𝐀𝐳𝐮𝐫𝐞 𝐖𝐀𝐅 – 𝐌𝐚𝐬𝐤𝐢𝐧𝐠 𝐒𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞 𝐃𝐚𝐭𝐚</p><p>WAF rules can thwart malicious requests containing personally identifiable info (PII). Azure WAF log scrubbing tool ensures data security. 🛡️ Safeguard your logs by removing sensitive data using custom rules.</p><p>Check out our latest blog where we dive into the log scrubbing feature and explore real examples. Discover how to strengthen your web app security today! </p><p><a href="https://techcommunity.microsoft.com/t5/azure-network-security-blog/azure-waf-masking-sensitive-data/ba-p/3905356" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcommunity.microsoft.com/t5</span><span class="invisible">/azure-network-security-blog/azure-waf-masking-sensitive-data/ba-p/3905356</span></a></p><p><a href="https://infosec.exchange/tags/AzureWAF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AzureWAF</span></a> <a href="https://infosec.exchange/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/waf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>waf</span></a> <a href="https://infosec.exchange/tags/scrubbing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scrubbing</span></a> <a href="https://infosec.exchange/tags/log" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>log</span></a> <a href="https://infosec.exchange/tags/sentinel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sentinel</span></a> <a href="https://infosec.exchange/tags/siem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>siem</span></a> <a href="https://infosec.exchange/tags/soar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>soar</span></a> <a href="https://infosec.exchange/tags/pii" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pii</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a> <a href="https://infosec.exchange/tags/soc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>soc</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/loganalytics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>loganalytics</span></a></p>
Liz<p>Interesting article on Slashdot today. Webapps. Do you use them? Can you recommend any? Is it worth switching from a regular phone app?</p><p><a href="https://mobile.slashdot.org/story/23/06/03/1742245/progressive-web-apps-dont-spy-or-clog-your-phone-do-you-use-them" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mobile.slashdot.org/story/23/0</span><span class="invisible">6/03/1742245/progressive-web-apps-dont-spy-or-clog-your-phone-do-you-use-them</span></a></p><p><a href="https://mastodon.scot/tags/webapps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapps</span></a> <a href="https://mastodon.scot/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://mastodon.scot/tags/iphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iphone</span></a> <a href="https://mastodon.scot/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://mastodon.scot/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a> <a href="https://mastodon.scot/tags/dataprivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprivacy</span></a></p>
thefluffy007 :verified:<p>: Solving <span class="h-card"><a href="https://infosec.exchange/@RealTryHackMe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>RealTryHackMe</span></a></span> - Brooklyn Nine Nine <a href="https://infosec.exchange/tags/webapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapp</span></a> <a href="https://infosec.exchange/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webappsecurity</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/ctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ctf</span></a><br><a href="https://wp.me/p2if9U-Rr" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">wp.me/p2if9U-Rr</span><span class="invisible"></span></a></p>