You are here |
timtech.blog | ||
| | | |
www.sjoerdlangkemper.nl
|
|
| | | | This article describes how cross site request forgery works, how sites defend against it and how to bypass these defenses. | |
| | | |
www.sjoerdlangkemper.nl
|
|
| | | | Cookies are typically sent to third parties in cross origin requests. This can be abused to do CSRF attacks. Recently a new cookie attribute was proposed to disable third-party usage for some cookies, to prevent CSRF attacks. This post will describe the same-site cookie attribute and how it helps against CSRF. | |
| | | |
www.redotheweb.com
|
|
| | | | As we're reinventing web applications with SPAs and frontend frameworks, we need to reinvent web application security, too. | |
| | | |
www.cybereason.com
|
|
| | A critical, unauthenticated remote code execution vulnerability, tracked as CVE-2025-32433, have been discovered in Erlang/OTP's SSH implementation. |