Post Mortem on Log4J
Vulnerabilities

Post Mortem on Log4J

The purpose of any post mortem is to look into the past in order to find ways to prevent similar issues from happening again, and

Vulnerabilities

6 CSRF Mitigation Techniques You Must Know

What Is CSRF (Cross-Site Request Forgery)? Cross-site request forgery (CSRF) is a cyber attack technique in which hackers impersonate a legitimate, trusted user. CSRF attacks