fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#websecurity

5 posts5 participants0 posts today
halil deniz<p>SQL Injection Cheat Sheet: A Comprehensive Guide<br><a href="https://denizhalil.com/2025/04/02/sql-injection-cheat-sheet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">denizhalil.com/2025/04/02/sql-</span><span class="invisible">injection-cheat-sheet/</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a> <a href="https://mastodon.social/tags/sql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sql</span></a> <a href="https://mastodon.social/tags/sqlinjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sqlinjection</span></a> <a href="https://mastodon.social/tags/webapplicationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webapplicationsecurity</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/blogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blogger</span></a></p>
Miguel Afonso Caetano<p>"API keys are foundational elements for authentication, but relying solely on them is inherently a risky proposal.</p><p>Firstly, there’s the reality that API keys are not securely designed — they were never meant to be used as the sole form of authentication, and as such, they aren’t really built for the task. These keys can often be easily stolen, leaked, or, in some cases (especially if generated incrementally), outright guessed. An API key is suitable for tracking usage but is poor for security.</p><p>There is also the additional reality that keys in their default state lack some critical functionality. There’s not a lot of verification built-in for identity management, and what does exist offers very little in the way of granular access control.</p><p>Ultimately, solely relying on API keys is a mistake common with novice developers but frighteningly common even in advanced products.</p><p>Best Practices<br>Instead of relying heavily on API keys as a sole mechanism, combine those keys with additional approaches such as OAuth 2.0 or mTLS. Implement rigorous expiration and rotation policies to ensure that keys which are made public are only useful for a short amount of time. Consider more advanced approaches, such as IP whitelisting or device fingerprinting, to add another layer of security atop the API key process."</p><p><a href="https://nordicapis.com/9-signs-youre-doing-api-security-wrong/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nordicapis.com/9-signs-youre-d</span><span class="invisible">oing-api-security-wrong/</span></a></p><p><a href="https://tldr.nettime.org/tags/API" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>API</span></a> <a href="https://tldr.nettime.org/tags/APIs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APIs</span></a> <a href="https://tldr.nettime.org/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a> <a href="https://tldr.nettime.org/tags/APIDesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APIDesign</span></a> <a href="https://tldr.nettime.org/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
Miguel Afonso Caetano<p>"It is now time to fix it for good. A new solution has been proposed: partitioning visited link history. This approach fundamentally changes how browsers store and expose visited link data. Instead of maintaining a global list, web browsers will store visited links with a triple-key partition:</p><p>- Link URL. The destination of the visited link.<br>- Top-Level Site. The domain of the main browsing context.<br>- Frame Origin. The origin of the frame rendering the link.</p><p>A link is only styled as :visited if it was visited from the same top-level site and frame origin (...) This approach guarantees isolation and works well with the web's same-origin policy. The system records only navigations initiated by link clicks or scripts—excluding direct address bar entries or bookmark navigations.</p><p>Key benefits of this model include: strong protection against cross-site history leaks, solving for good of many known side-channel attacks, support for meaningful styling within trusted, same-context domains, conforming to established web privacy principles and data protection regulations.</p><p>This feature is already implemented in Chrome (v132, behind a <a href="https://tldr.nettime.org/tags/partition" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>partition</span></a>-visited-link-database-with-self-links flag). I am confident that in 2025 we are going to have this privacy headache solved once and for all."</p><p><a href="https://blog.lukaszolejnik.com/fixing-web-browser-history-leaks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.lukaszolejnik.com/fixing-</span><span class="invisible">web-browser-history-leaks/</span></a></p><p><a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://tldr.nettime.org/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://tldr.nettime.org/tags/WebBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebBrowser</span></a> <a href="https://tldr.nettime.org/tags/WebBrowserHistory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebBrowserHistory</span></a></p>
OWASP Foundation<p>Master Modern Web App Security at OWASP Global AppSec EU 2025 in Barcelona!</p><p>2-Day Training | May 27-28, 2025 <br>Level: Intermediate | Trainer: Abraham Aranguren </p><p>Take a 100% hands-on deep dive into the OWASP Security Testing Guide and Application Security Verification Standard (ASVS) in this action-packed course. </p><p>Register now ⬇️ <br><a href="https://owasp.glueup.com/event/123983/register/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/123983/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/AppSecEU2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSecEU2025</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/NodeJS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NodeJS</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Barcelona" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Barcelona</span></a></p>
N-gated Hacker News<p>🚨 BREAKING NEWS: Swiss passport design REVEALED! 🚨 Oops, just kidding—turns out it’s a secret so secure, even you're forbidden from seeing it. 🕵️‍♂️🔒 If only Swiss <a href="https://mastodon.social/tags/neutrality" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>neutrality</span></a> extended to web access too. 🙄💻<br><a href="https://kottke.org/25/03/the-design-of-the-new-swiss-passport" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kottke.org/25/03/the-design-of</span><span class="invisible">-the-new-swiss-passport</span></a> <a href="https://mastodon.social/tags/SwissPassportDesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SwissPassportDesign</span></a> <a href="https://mastodon.social/tags/SecretAccess" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecretAccess</span></a> <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngated</span></a></p>
matdave<p>I just released a beta tool I&#39;ve been trying out for a while called CSPect, for managing Content Security Policies directly in <a href="https://fosstodon.org/tags/MODXCMS" class="mention hashtag" rel="tag">#<span>MODXCMS</span></a> <a href="https://extras.modx.com/package/cspect" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">extras.modx.com/package/cspect</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/CSP" class="mention hashtag" rel="tag">#<span>CSP</span></a> <a href="https://fosstodon.org/tags/WebSecurity" class="mention hashtag" rel="tag">#<span>WebSecurity</span></a> <a href="https://fosstodon.org/tags/CMS" class="mention hashtag" rel="tag">#<span>CMS</span></a></p>
Relianoid<p>Application Layer Gateways (ALG) 🔍🚀</p><p>ALGs enhance security &amp; performance by: <br />✅ Enabling NAT traversal <br />🔍 Blocking threats (SQLi, XSS) <br />🔐 Inspecting SSL/TLS traffic <br />⚡ Boosting speed with caching &amp; HTTP/3 <br />🛡 Acting as a WAF </p><p>Essential for modern networking! </p><p><a href="https://fosstodon.org/tags/CyberSecurity" class="mention hashtag" rel="tag">#<span>CyberSecurity</span></a> <a href="https://fosstodon.org/tags/Networking" class="mention hashtag" rel="tag">#<span>Networking</span></a> <a href="https://fosstodon.org/tags/ALG" class="mention hashtag" rel="tag">#<span>ALG</span></a> <a href="https://fosstodon.org/tags/WAF" class="mention hashtag" rel="tag">#<span>WAF</span></a> <a href="https://fosstodon.org/tags/WebSecurity" class="mention hashtag" rel="tag">#<span>WebSecurity</span></a><br /><a href="https://www.relianoid.com/resources/knowledge-base/misc/what-is-application-layer-gateway/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">relianoid.com/resources/knowle</span><span class="invisible">dge-base/misc/what-is-application-layer-gateway/</span></a></p>

🌐💻 Is your web app secure? If you haven’t checked the OWASP Top 10, now is the time! 2025 updates are coming, and staying ahead of the latest cybersecurity threats is crucial. 🚀

From broken authentication to insecure design, these risks can expose your business to serious threats. At RELIANOID, we break down everything you need to know!

🔗 Read our latest blog and get ready for the 2025 OWASP updates: relianoid.com/blog/owasp-top-1

🤔 Oh no! The sky is falling! 🌧️ The unauthenticated web is apparently under threat from those terrifying AI scrapers that just can't resist causing havoc. Clearly, we should all panic and throw our websites into the arms of corporate gatekeepers. 🙄
sethmlarson.dev/i-fear-for-the #AIThreats #WebSecurity #CorporateGatekeepers #PanicMode #HackerNews #ngated

sethmlarson.devI fear for the unauthenticated web
More from Seth Larson

Although frequently misunderstood, the HTTP Cache-Control header is crucial because it specifies caching mechanisms within requests and responses.  In its typical format, it reveals details as to how resources are stored, the location of the resource and the maximum age before expiring…

In our latest blog post, Kieran Larking highlights that the No-cache directive does not prevent caching and looks at typical caching behaviour directives and how to correctly use these directives to balance performance and security: pentestpartners.com/security-b