Skip to main content
Tooling
0 votes
0 replies
20 views

I have a project that is currently in github pages (and will change to codeberg sometime this year) and we want to invite collaborators of all backgrounds. This means a lot might not have a github/...
Spaghettiboy's user avatar
Advice
0 votes
2 replies
52 views

Running untrusted TensorFlow models and noticed this: import tensorflow as tf import time class TestLayer(tf.keras.layers.Layer): def call(self, inputs): n = tf.cast(inputs[0][0], tf....
Madhan Alagarsamy's user avatar
Advice
0 votes
0 replies
28 views

Rewind to 2024, CVE-2024-3094 is discovered. Quoting cve.org for brevity, Malicious code was discovered in the upstream tarballs of xz. ... that can be used by any software linked against this ...
h1fa's user avatar
  • 1
Advice
1 vote
2 replies
115 views

I am a beginner in programming and I want to choose a good career path. I am considering Full Stack Development, AI/ML, and Cyber Security. I want to know which one is most suitable and has good ...
Prinjal Kumari's user avatar
Advice
0 votes
0 replies
34 views

I am working on a smart home security system using Node.js where devices like cameras and sensors send data to an API. I want to make sure the API is secure and protected from unauthorized access. ...
williambryn's user avatar
Advice
1 vote
1 replies
85 views

I'm trying to understand how large-scale authentication systems (like Netflix) implement user verification. Specifically, how are devices detected and classified (trusted vs new), and how are IP ...
Monika Dangar's user avatar
Best practices
1 vote
3 replies
63 views

I am writing JavaScript code that runs in a web browser, retrieves a user-supplied XML file, and gets certain information out of it. I know that XML parsing is a potentially dangerous operation if the ...
SoItBegins's user avatar
3 votes
1 answer
103 views

We have the following code in our Angular application: const auth_token = sessionStorage.getItem('auth_token') || this.sessionStorage.retrieve('authenticationtoken') || ...
Mahesh Hadagali Sangamesh's user avatar
Tooling
0 votes
3 replies
128 views

I am a beginner student working on a mini project about a "Phishing Detection and Awareness System". I want to create a simple system that can: - Check whether a URL is safe or suspicious - ...
Muhammed Yaseen TK's user avatar
Advice
0 votes
1 replies
213 views

I’m building a cybersecurity tool (antivirus-style system) that scans files and detects malicious behavior. Current setup: - Backend: FastAPI - Frontend: React (Vite) - Features implemented: File ...
Ahsan's user avatar
  • 1
Tooling
0 votes
0 replies
40 views

I am looking to implement a Cryptographic Bill of Materials (CBOM) as part of our security and compliance initiative. What open‑source tools are currently recommended for CBOM generation or crypto ...
Jayakumari Arumugham's user avatar
4 votes
1 answer
149 views

I have been researching security related topics and I looked at the source code of phpMyAdmin to see how things are done in a well-established application. I checked out the code in the "PATH\...
VyR's user avatar
  • 287
Best practices
0 votes
1 replies
59 views

Building a web application and want to implement authentication in a secure and scalable way. I understand the basics of login/signup flows, but I’m unsure about best practices for handling ...
Sietrix Technologies's user avatar
4 votes
3 answers
196 views

Reading up about time-of-check to time-of-use (TOCTOU) vulnerabilities, I've seen the access() function referenced multiple times in examples of such vulnerabilities. The typical case being where it ...
McDaMastR's user avatar
Best practices
0 votes
1 replies
55 views

I am developing a Next.js (App Router) application and I'm looking for the current "best practice" for storing user session tokens (JWTs). Given the server-client hybrid nature of Next.js, I ...
Khadam Hussain's user avatar

15 30 50 per page
1
2 3 4 5
3754