Published inStackademicImplementing Role-Based Access Control using CASLHey everyone, I’m back to blogging after a year I guess! I have started Working in a software company managing security and handling MERN…Jul 14Jul 14
Configuring Aws CLI for security testing!Hello fellas it’s been long since I blogged. I have been working on some personal building and giving my time to do bug bounty now I gonna…Jul 18, 2022Jul 18, 2022
Basic concepts of OOP!Hey buddy, It’s been a long since I blogged and I wrote this cool blog in a selfish to make me understand the OOP concepts and I hope you…Feb 26, 2022Feb 26, 2022
#10 Insufficient Logging and Monitoring — Security BasicsThe best-case scenario for an attacker is if attacks on an application can go unnoticed as this would give the confidence to carry out…Feb 2, 2021Feb 2, 2021
#9 Using Components With Known Vulnerability — Security BasicsWhat is Using components known vulnerabilities ?Jan 31, 2021Jan 31, 2021
#7 Security Misconfiguration — Security BasicsIn this blog we are going to learn about the security misconfiguration from the OWASP top 10 .we are learning this from past month and…Jan 30, 2021Jan 30, 2021
#6 Broken Access Control — Security BasicsBefore we talk about Broken Access Control, let’s get to grips with Access Control.Jan 30, 2021Jan 30, 2021