Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CSRF

Below you will find reports with the tag of “CSRF”

image from State of Software Security v11: Open Source Edition

State of Software Security v11: Open Source Edition

Get best practices on managing your open source libraries in our State of Software Security v11: Open Source Edition report. Based on 13 million scans of more than 86,000 repositories, SOSS v11: Open Source Edition gives you a unique perspective on the open source libraries in codebases today, how organizations are managing the security of these libraries, and best practices on using open source code securely. (more available)
Added: June 22, 2021
image from The state of JavaScript frameworks security report 2019

The state of JavaScript frameworks security report 2019

This report covers: the security practices for each of the two different core projects, both Angular and React, the state of security of each of the two different module ecosystems, based on an in-depth look at the vulnerabilities contained in each of the ecosystems, the security practices for other common JavaScript frontend framework alternatives such as Vue. (more available)
Added: February 12, 2020
image from JWT Handbook

JWT Handbook

Ever wondered how JWT came to be and what problems it was designed to tackle? Are you curious about the plethora of algorithms available for signing and encrypting JWTs? (more available)
Added: October 20, 2018
image from March 2018 AppSec Intelligence Report

March 2018 AppSec Intelligence Report

This monthly report details Application Security obvservations from March 2018.
Added: October 20, 2018
image from Network Attached Security Attacking A Synology NAS

Network Attached Security Attacking A Synology NAS

Network-Attached Storage (NAS) devices are a popular way for people to store and share their photos, videos and documents. Securing these devices is essential as they can contain sensitive information and are often exposed to the Internet. (more available)
Added: October 18, 2018
image from Authentication Survival Guide

Authentication Survival Guide

This book aims to be an accessible starting point for everyone that is starting to work with authentication. In this book, you’ll find a concise review of all the key protocols, formats, concepts and terminology that you’ll likely come across when implementing authentication. (more available)
Added: October 17, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). (more available)
Added: October 15, 2018
image from The State of Bug Bounty 2016

The State of Bug Bounty 2016

This is an annual report that provides an inside look into the economics and emerging trends of bug bounties, with data collected from Bugcrowd’s platform and other sources throughout 2016. (more available)
Added: October 14, 2018
image from 2017 State Of Bug Bounty Report

2017 State Of Bug Bounty Report

This report mines that data and details to provide an inside look to the economics and emerging trends of managed bug bounty programs. (more available)
Added: October 13, 2018
© Cyentia Institute 2023
Library updated: February 8, 2023 16:09 UTC (build 051771c)