Open in app

Sign In

Write

Sign In

Sudip Sengupta
Sudip Sengupta

29 Followers

Home

About

Nov 11, 2022

Leveraging Destructive And Non-Destructive Testing In Application Development

Software testing is a crucial phase of a software development life cycle that helps evaluate whether the application meets the expected requirements. A common approach is examining the software’s behavior and artifacts through component verification and validation. …

7 min read

Leveraging Destructive And Non-Destructive Testing In Application Development
Leveraging Destructive And Non-Destructive Testing In Application Development

7 min read


Published in Ambassador Labs

·Nov 10, 2022

Skaffold vs Telepresence: Comparing Kubernetes Inner Development Loop Tools

The Kubernetes inner development loop supports various stages of a development workflow, starting from the developer writing the code until it is deployed to production. Skaffold and Telepresence are two popular Kubernetes inner development loop tools that support continuous development in modern DevOps frameworks. Skaffold is an open source command-line…

Skaffold

6 min read

Skaffold vs Telepresence: Comparing Kubernetes Inner Development Loop Tools
Skaffold vs Telepresence: Comparing Kubernetes Inner Development Loop Tools
Skaffold

6 min read


Nov 8, 2022

What Is The CSRF Login Attack?

Cross-site request forgery is an attack in which an adversary can submit a malicious request on behalf of the victim user. In an application with cross-site request forgery (CSRF) vulnerabilities, malicious users can submit unauthorized commands since the application trusts the origin user account. Also known as session riding, XSRF…

7 min read

What Is The CSRF Login Attack?
What Is The CSRF Login Attack?

7 min read


Nov 7, 2022

What Is A Javascript Injection Attack And How Is It Orchestrated?

An injection vulnerability allows a malicious actor to inject harmful code into a system through another application. Hackers typically use injection attacks to access the backend server configuration, shell commands, or OS calls when the application fails to validate user input adequately. …

6 min read

What Is A Javascript Injection Attack And How Is It Orchestrated?
What Is A Javascript Injection Attack And How Is It Orchestrated?

6 min read


Nov 5, 2022

What Is the Stored CSRF Vulnerability?

Cross-site request forgery (CSRF) is a security vulnerability that allows an attacker to submit unusual, malicious requests on behalf of an unsuspecting user. CSRF attacks, also known as one-click attacks, cross-site reference forgery, session riding, or hostile linking, take advantage of the trust between the server and client-side session, causing…

7 min read

What Is the Stored CSRF Vulnerability?
What Is the Stored CSRF Vulnerability?

7 min read


Nov 3, 2022

Http.Sys Remote Code Execution Vulnerability (Cve-2022–21907)

The Remote Code Execution Vulnerability (RCE) is a security vulnerability exploited by malicious users to run arbitrary code on a compromised server/computer. A remote code execution attack is typically aimed at gaining system-level privileges and administrative access to a public-facing application, giving the unauthenticated attacker visibility of the server’s stack…

6 min read

Http.Sys Remote Code Execution Vulnerability (Cve-2022–21907)
Http.Sys Remote Code Execution Vulnerability (Cve-2022–21907)

6 min read


Nov 1, 2022

What Is A Port Scan Attack?

Computer ports are crucial components in application programming and networking since they provide a central docking point for exchanging information between two entities. A port number provides consistency and is combined with the target host IP address to form the vital information that the internet service provider uses to fulfill…

5 min read

What Is A Port Scan Attack?
What Is A Port Scan Attack?

5 min read


Published in Ambassador Labs

·Oct 11, 2022

What is Rate Limiting in Application Design?

Modern web applications rely on Application Programming Interfaces (APIs) to handle client requests and transfer data between entities. API rate limiting is used to protect web resources and services by preventing the frequency of transactions from exceeding a set maximum number. In this article, you’ll learn: what rate limiting is, …

Rate Limit

7 min read

What is Rate Limiting in Application Design?
What is Rate Limiting in Application Design?
Rate Limit

7 min read


Sep 26, 2022

What is Directory Traversal in Cyber Security?

In a standard web server directory, the root folder is the publicly accessible folder that can be accessed when a user types a website’s domain name on the address bar. The root directory contains the site’s index file and paths to all other files and directories used in the system…

6 min read

What is Directory Traversal in Cyber Security?
What is Directory Traversal in Cyber Security?

6 min read


Sep 23, 2022

Password Reset Poisoning — Attack Types and Prevention

Modern application security relies on the username-password combination as the most common approach to authenticate registered users into a digital entity. Because of its ease of implementation for most digital experiences, a password function is used to offer the first line of defense for both front and backend security. However…

6 min read

Password Reset Poisoning — Attack Types and Prevention
Password Reset Poisoning — Attack Types and Prevention

6 min read

Sudip Sengupta

Sudip Sengupta

29 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech