Black Fedora
Anti-Abuse for Developers

Anti-Abuse for Developers

Follow
homeTheoryPractical Tipsnewsletter
Tag

Security

#security

More content

Read more stories on Hashnode


Articles with this tag

πŸ”‘ Password attack types and mitigation strategies

Apr 30, 20226 min read

In this post we are going to talk about different password attacks. Knowing how to attack it will help us to propose a defense solution. In general...

πŸ”‘ Password attack types and mitigation strategies

πŸ”„ How to close the feedback loop on an attacker

Apr 6, 20223 min read

Why embedding SIEM into your application is not such a bad idea. Β· When we discussed adversarial cycle we mentioned that defending the system is a...

πŸ”„ How to close the feedback loop on an attacker

Apache: Restrict access by IP address

Apr 5, 20223 min read

Crude way to stop an attack in case of an emergency. Β· Keep in mind that this is a static configuration, which is not very effective against adversarial...

Apache: Restrict access by IP address

HAProxy: Restrict access by IP address

Apr 2, 20222 min read

Crude way to stop an attack in case of an emergency. Β· Keep in mind that this is a static configuration, which is not very effective against adversarial...

HAProxy: Restrict access by IP address

NGINX: Restrict access by IP address

Apr 2, 20222 min read

Crude way to stop an attack in case of an emergency. Β· Keep in mind that this is a static configuration, which is not very effective against adversarial...

NGINX: Restrict access by IP address

βš” Adversarial Cycle

Apr 1, 20223 min read

The majority of application security problems stem from software bugs that leave the existing security controls broken. However, even if the code is...

βš” Adversarial Cycle