Back

Gigaversity

Gigaversity.inย โ€ขย 9m

Web apps are getting smarter โ€” so are the attacks targeting them. Two of the most common threats that silently compromise user trust? CSRF and XSS. They might sound similar, but their impact and execution are very different. From hijacking user sessions to injecting malicious scripts, these attacks exploit vulnerabilities that developers must understand and guard against. Swipe through to get a clear picture of how these attacks work and how you can stay one step ahead. Follow Gigaversity on linkedin for complete Code Analogy series.

Reply
5

More like this

Recommendations from Medial

Vansh Khandelwal

Full Stack Web Devel...ย โ€ขย 1y

Security testing ensures that applications are free from vulnerabilities like SQL Injection, XSS, CSRF, and IDOR. SQL Injection occurs when unsanitized inputs allow attackers to manipulate database queries. This can be mitigated by using parameterize

See More
Reply
2

Account Deleted

Hey I am on Medialย โ€ขย 1y

๐Ÿšจ deepseek said it would temporarily limit user registrations โ€œdue to large-scale malicious attacksโ€ on its services. they are trying to kill the whale ๐Ÿ‹ ๐Ÿ˜ข

Reply
13

Sheikh Ayan

Founder of VistaSec:...ย โ€ขย 11m

Bypassing EDR with Custom Shellcode Loaders โ€“ A Red Teamer's Approach Modern EDRs use user-mode hooks, behavioral analysis, and memory scanning to flag malicious activity. To bypass them, you need precision-crafted tooling. This deep-dive explores

See More
Reply
3

Ankit Joshi

Hey I am on Medialย โ€ขย 1y

๐—ง๐—ต๐—ฒ ๐—ฅ๐—ถ๐˜€๐—ฒ ๐—ผ๐—ณ ๐—”๐—œ-๐—•๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€: AI-based phishing is an emerging cyber threat leveraging machine learning to craft realistic, personalized phishing attacks that bypass traditional defenses. By analyzing languag

See More
Reply
1
3

Vansh Khandelwal

Full Stack Web Devel...ย โ€ขย 7m

In the rapidly evolving digital landscape, APIs (Application Programming Interfaces) serve as essential connectors among software applications, enabling seamless communication between systems. However, their accessibility also makes them prime target

See More
Reply
3

Shreyash

Be crazyย โ€ขย 9m

Has anyone using Zerodha noticed that the Kite app integrates third-party services like Tickertape and Smallcase, and when accessing Console, it doesnโ€™t open within the app but instead redirects to the browser (Chrome or the default browser on your p

See More
Reply
3

Sheikh Ayan

Founder of VistaSec:...ย โ€ขย 12m

๐Ÿ”’ How to Secure Your System & Servers Like a Pro! ๐Ÿš€ Follow these advanced tips to safeguard your systems and servers from potential attacks: โœ… Enable Multi-Factor Authentication (MFA) โ€“ Add an extra layer of security beyond passwords. ๐Ÿ›ก Implemen

See More
Reply
3

Gigaversity

Gigaversity.inย โ€ขย 9m

What is an API? Have you ever ordered food at a restaurant? The internet works in a similar way! An API (Application Programming Interface) is like a waiter - it takes your request, delivers it to the kitchen (backend), and brings back the response.

See More
Reply
7

Tweak Buzz

TweakBuzz makes you ...ย โ€ขย 8m

Site Performance Metrics Tips for 2025 Success | TweakBuzz Want to level up your website in 2025? Understanding and improving your site performance metrics is the key to better rankings, smoother user experience, and higher conversions. From page lo

See More
Reply
1
2

Rahul Agarwal

Founder | Agentic AI...ย โ€ขย 1m

Most people skip guardrails, their AI systems break. Iโ€™ve explained in a very simple way below. 1. ๐—œ๐—ป๐—ฝ๐˜‚๐˜ & ๐—ข๐˜‚๐˜๐—ฝ๐˜‚๐˜ ๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ๐—ฟ๐—ฎ๐—ถ๐—น๐˜€ This is the ๐—ฒ๐—ป๐˜๐—ฟ๐˜† ๐—ฎ๐—ป๐—ฑ ๐—ฒ๐˜…๐—ถ๐˜ ๐—ฐ๐—ต๐—ฒ๐—ฐ๐—ธ of the system. โ€ข User input is checked for safety โ€ข

See More
Reply
1
3

Download the medial app to read full posts, comements and news.