Back

Gigaversity

Gigaversity.in • 28d

Web apps are getting smarter — so are the attacks targeting them. Two of the most common threats that silently compromise user trust? CSRF and XSS. They might sound similar, but their impact and execution are very different. From hijacking user sessions to injecting malicious scripts, these attacks exploit vulnerabilities that developers must understand and guard against. Swipe through to get a clear picture of how these attacks work and how you can stay one step ahead. Follow Gigaversity on linkedin for complete Code Analogy series.

0 replies5 likes

More like this

Recommendations from Medial

Vansh Khandelwal

Full Stack Web Devel... • 5m

Security testing ensures that applications are free from vulnerabilities like SQL Injection, XSS, CSRF, and IDOR. SQL Injection occurs when unsanitized inputs allow attackers to manipulate database queries. This can be mitigated by using parameterize

See More
0 replies2 likes

Chamarti Sreekar

Passionate about Pos... • 5m

🚨 deepseek said it would temporarily limit user registrations “due to large-scale malicious attacks” on its services. they are trying to kill the whale 🐋 😢

0 replies13 likes

Sheikh Ayan

Founder of VistaSec:... • 3m

10 Advanced Red Teaming Tactics for Unbeatable Cyber Resilience 🚨💻 Red teaming is not just about hacking—it's about thinking like real-world adversaries to uncover hidden weaknesses before they do. Here are 10 advanced tactics used by elite threat

See More
0 replies3 likes
Image Description
Image Description

Vivek kumar

On medial • 5m

Artificial intelligence models like ChatGPT are designed with safeguards to prevent misuse, but the possibility of using AI for hacking cannot be ruled out. Countries or malicious actors could create AI systems specifically for unethical purposes, su

See More
3 replies9 likes
3

Sheikh Ayan

Founder of VistaSec:... • 2m

Bypassing EDR with Custom Shellcode Loaders – A Red Teamer's Approach Modern EDRs use user-mode hooks, behavioral analysis, and memory scanning to flag malicious activity. To bypass them, you need precision-crafted tooling. This deep-dive explores

See More
0 replies3 likes

Sheikh Ayan

Founder of VistaSec:... • 5m

Top Exploit Development Tools 1. Immunity Debugger Advanced debugger for analyzing vulnerabilities. #!mona seh (SEH exploit analysis with Mona plugin) 2. Metasploit Comprehensive exploitation toolkit. #msfvenom -p windows/meterpreter/reverse

See More
0 replies3 likes
1

Ankit Joshi

Hey I am on Medial • 8m

𝗧𝗵𝗲 𝗥𝗶𝘀𝗲 𝗼𝗳 𝗔𝗜-𝗕𝗮𝘀𝗲𝗱 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝗔𝘁𝘁𝗮𝗰𝗸𝘀: AI-based phishing is an emerging cyber threat leveraging machine learning to craft realistic, personalized phishing attacks that bypass traditional defenses. By analyzing languag

See More
0 replies3 likes
1

Sheikh Ayan

Founder of VistaSec:... • 3m

🔒 How to Secure Your System & Servers Like a Pro! 🚀 Follow these advanced tips to safeguard your systems and servers from potential attacks: ✅ Enable Multi-Factor Authentication (MFA) – Add an extra layer of security beyond passwords. 🛡 Implemen

See More
0 replies3 likes
Image Description
Image Description

Sheikh Ayan

Founder of VistaSec:... • 4m

🚨 Top IoT Vulnerabilities You Need to Know! 🚨 🔹 Weak Passwords & Default Credentials – Many IoT devices ship with default passwords that are easy to guess. 🔹 Unpatched Firmware – Outdated software can have security flaws that hackers exploit. 🔹

See More
4 replies7 likes

Gigaversity

Gigaversity.in • 1m

What is an API? Have you ever ordered food at a restaurant? The internet works in a similar way! An API (Application Programming Interface) is like a waiter - it takes your request, delivers it to the kitchen (backend), and brings back the response.

See More
0 replies7 likes

Download the medial app to read full posts, comements and news.