#securityUnmoderated tagAll postsTrending CommunitiesWorldmappinHIVE CN 中文社区SplinterlandsActifitPhotography LoversLeoFinanceHive FoodBlack And WhiteHive LearnersBuzzParty Meet Hive!Hive GamingLifestyleExplore Communities...#securityTrendingHotNewPayoutsMutedscipio (68)in StemSocial • 2 hours agoLearn Ethical Hacking (#22) - Business Logic Flaws - When the Code Works But the Logic Doesn'tLearn Ethical Hacking (#22) - Business Logic Flaws - When the Code Works But the Logic Doesn't What will I learn Why business logic flaws are the hardest…scipio (68)in StemSocial • yesterdayLearn Ethical Hacking (#21) - API Security - The New Attack SurfaceLearn Ethical Hacking (#21) - API Security - The New Attack Surface What will I learn Why APIs are the fastest-growing attack surface on the internet; REST…cryptoandcoffee (84)in Solar energy • 4 days agoSolar Theft On The Rise In South AfricaCrime Is A Way Of Life In South Africa A worrying new trend has appeared in South Africa over the last 6 months and that is properties being targeted that have solar…securityservices (5)in LeoFinance • 6 hours agoTop 10 Industries That Benefit Most from Security Guard ServicesIn the modern business landscape, security has shifted from a convenience to a critical operational requirement making professional security guard services essential for…scipio (68)in StemSocial • 2 days agoLearn Ethical Hacking (#20) - File Upload Vulnerabilities - When Users Upload WeaponsLearn Ethical Hacking (#20) - File Upload Vulnerabilities - When Users Upload Weapons What will I learn Why file uploads are one of the most dangerous features in…ozelot47 (71)in Deutsch D-A-CH • 3 days agoDaten sicher unter Linux löschenMan löscht eine Datei, indem man sie in den Papierkorb verschiebt und anschließend den Papierkorb leert. Das war’s, die Datei ist unwiderruflich gelöscht, da der Vorgang nicht…badbitch (74)in LeoFinance • 3 days agoHow can crypto networks adopt restaking safely?There's a saying that loosely translates to: a country that outsources its army is an enemy of itself. It's fun to talk about efficiency, almost too compelling to look at how…scipio (68)in StemSocial • 3 days agoLearn Ethical Hacking (#19) - Insecure Deserialization - Code Execution via DataLearn Ethical Hacking (#19) - Insecure Deserialization - Code Execution via Data What will I learn What serialization and deserialization are and why they're…scipio (68)in StemSocial • 4 days agoLearn Ethical Hacking (#18) - Server-Side Request Forgery - Making Servers Betray ThemselvesLearn Ethical Hacking (#18) - Server-Side Request Forgery - Making Servers Betray Themselves What will I learn What SSRF is and why it's one of the most dangerous…scipio (68)in StemSocial • 5 days agoLearn Ethical Hacking (#17) - Authentication Bypass - Getting In Without a PasswordLearn Ethical Hacking (#17) - Authentication Bypass - Getting In Without a Password What will I learn How authentication systems break: logic flaws , token…badbitch (74)in LeoFinance • 7 days agoDoes DeFi need circuit breakers?Following recent DeFi exploits, discussions around circuit breakers have made the news. A very recent report that caught my attention is this one from Cointelegraph: Andre…scipio (68)in StemSocial • 6 days agoLearn Ethical Hacking (#16) - Cross-Site Request Forgery - Making Users Attack ThemselvesLearn Ethical Hacking (#16) - Cross-Site Request Forgery - Making Users Attack Themselves What will I learn What CSRF is and why it's fundamentally different from…mrosenquist (72)in #ai • 6 days agoMythos Is Rewriting the Rules of CybersecurityMythos Is Rewriting the Rules of Cybersecuritybb8bdt (13)in #gaming • 2 days agoমোবাইল অনলাইন গেমিং নিরাপত্তা নিশ্চিত করুনসেরা অফার পেতে ভিজিট করুন। আরও গেমিং গাইড ও বোনাস অফারের জন্য ভিজিট করুন 👉 🎰 Best Online Casino Reviews (BD/LK/NP):