Securing Web Uploads: Extension Denylisting

At the forefront of cybersecurity lies an ever-present battle between web defenders and attackers; one such battleground is file uploads – an integral component of many web applications that, if neglected properly, can become an entryway for cyber threats to enter. Uploading web shells without authorization stands out as one particularly risky tactic that allows...

JWT – Deep Dive into Algorithm Confusion

Since the first time I studied JWT, I found it one of the most intriguing topics to discuss about web application security, and there are good reasons for this. Introduced in 2010, JSON Web Tokens (JWTs) only started gaining mainstream traction after 2018, marking them as a relatively modern technological advancement.  Because it is new,...

Seven Common Web App Vulnerabilities

Web applications are essential to our daily lives but pose a significant security risk. Cybercriminals are always looking for ways to exploit vulnerabilities in web applications to gain unauthorized access, steal data, or compromise systems. This blog will discuss the seven most common web application vulnerabilities and ways to prevent them. 1) Injection  Injection flaws...