You might see Spring's DelegatingFilterProxy crop up sometimes. It's actually a proxy for a standard Servlet Filter. Let's see an example in action with Spring Security.
SQL injections are some of the most common types of attacks. Read on to learn what vulnerable code looks like, and how to defend against these attacks.
Learn how to better protect your web applications using a simple, and easy-to-use ASP.NET Core attribute, RequireHsts, which requires your browser to use HTTPS.
We've all heard of emails being vectors for attacks, but what exactly is email header injection, how can it be mitigated? We take a look at these questions in this post.
If you're an ASP.NET Core dev, but are tired of having to use ASP.NET Core's dependency injection container, read on to learn how to replace the existing DI container.
In the final part of our series, we look at some of the worst attacks than can be carried out against an insecure SSL/TLS network, and how to stop them.
In the world of security, it's important to know what you're up against. In this post, we've provided a list of the most common and dangerous web attacks.