mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#websecurity

4 posts4 participants1 post today
Open Web Docs<p>We've written a new guide on XS-Leaks: </p><p><a href="https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/XS-Leaks" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">developer.mozilla.org/en-US/do</span><span class="invisible">cs/Web/Security/Attacks/XS-Leaks</span></a></p><p>Many thanks to <span class="h-card" translate="no"><a href="https://social.security.plumbing/@freddy" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>freddy</span></a></span>, Hamish Willee, <span class="h-card" translate="no"><a href="https://fosstodon.org/@MartinaKraus11" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MartinaKraus11</span></a></span>, and <span class="h-card" translate="no"><a href="https://infosec.exchange/@terjanq" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>terjanq</span></a></span> for your reviews and collaboration. <a href="https://front-end.social/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a></p>
Tib3rius :antiverified:<p>Which lesser-known Burp extensions do you swear by? Share your favorites below! 👇</p><p><a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/BurpSuite" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BurpSuite</span></a> <a href="https://infosec.exchange/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a></p>
Hacker News<p>Detect and crash Chromium bots with one weird trick (bots hate it)</p><p><a href="https://blog.castle.io/detect-and-crash-chromium-bots-with-one-weird-trick-bots-hate-it/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.castle.io/detect-and-cras</span><span class="invisible">h-chromium-bots-with-one-weird-trick-bots-hate-it/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/DetectChromiumBots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DetectChromiumBots</span></a> <a href="https://mastodon.social/tags/CrashBots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrashBots</span></a> <a href="https://mastodon.social/tags/BotDetection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BotDetection</span></a> <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.social/tags/TechTricks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechTricks</span></a></p>
Amit Kamalbhai Dhanani<p>Can we generate Shared Secrete dynimically during web session intialization during each request-response?</p><p>Please check below link and all suggestions are welcome</p><p><a href="https://mastodon.social/tags/AJAX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AJAX</span></a> <a href="https://mastodon.social/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.social/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://mastodon.social/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://mastodon.social/tags/protection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protection</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/webattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webattack</span></a> <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.social/tags/Website" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Website</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p><p><a href="https://amitdhanani.in/2025/05/06/can-we-generate-shared-secrete-dynimically-during-web-session-intialization-during-each-request-response/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">amitdhanani.in/2025/05/06/can-</span><span class="invisible">we-generate-shared-secrete-dynimically-during-web-session-intialization-during-each-request-response/</span></a></p>
LavX News<p>Webfuse's Anonymous Links: A New Era of Secure Browsing</p><p>In an age where online privacy is paramount, Webfuse's latest browser extension, Anonymous Links, offers users a powerful tool for secure, anonymous web browsing. With its unique virtual web session t...</p><p><a href="https://news.lavx.hu/article/webfuse-s-anonymous-links-a-new-era-of-secure-browsing" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/webfuse-s</span><span class="invisible">-anonymous-links-a-new-era-of-secure-browsing</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.cloud/tags/PrivacyExtensions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyExtensions</span></a> <a href="https://mastodon.cloud/tags/AnonymousBrowsing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AnonymousBrowsing</span></a></p>
LavX News<p>Exploiting Weak Password Reset Mechanisms: A Deep Dive into Cybersecurity Techniques</p><p>In an alarming revelation, cybersecurity experts have detailed two sophisticated techniques to bypass flawed password reset implementations, leading to potential account takeovers. This article explor...</p><p><a href="https://news.lavx.hu/article/exploiting-weak-password-reset-mechanisms-a-deep-dive-into-cybersecurity-techniques" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/exploitin</span><span class="invisible">g-weak-password-reset-mechanisms-a-deep-dive-into-cybersecurity-techniques</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.cloud/tags/PasswordReset" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswordReset</span></a> <a href="https://mastodon.cloud/tags/SandwichAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SandwichAttack</span></a></p>
Ginger (she/her)<p>Fam. What's a good website hosting alternative to Google? i'd like something cheap easy reliable and not evil.</p><p>thanks 🙏🏼🫶🏼</p><p><a href="https://mastodon.social/tags/websitedesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websitedesign</span></a> <a href="https://mastodon.social/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a> <a href="https://mastodon.social/tags/freepalestine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freepalestine</span></a></p>
Kiara Taylor<p>Cross-Origin Resource Sharing (CORS) is a critical concept in web development, ensuring secure interactions between different origins. In this episode, we delve into the intricacies of CORS, exploring its role in modern web applications, common challenges developers face, and effective strategies to resolve cross-origin issues. </p><p><a href="https://mastodon.social/tags/CORS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CORS</span></a> <a href="https://mastodon.social/tags/WebDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDevelopment</span></a> <a href="https://mastodon.social/tags/CrossOrigin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrossOrigin</span></a> <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.social/tags/JavaScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaScript</span></a> <a href="https://mastodon.social/tags/DeveloperTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeveloperTips</span></a> <a href="https://mastodon.social/tags/TechPodcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechPodcast</span></a> </p><p><a href="https://podcasts.apple.com/us/podcast/understanding-cors-solving-cross-origin-resource-sharing/id1794862407?i=1000705028924" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">podcasts.apple.com/us/podcast/</span><span class="invisible">understanding-cors-solving-cross-origin-resource-sharing/id1794862407?i=1000705028924</span></a></p>
PHP Zen<p>If you code in PHP, you code for security </p><p>🔹 Auth<br>🔹 Encryption<br>🔹 CSRF, headers, dependencies…</p><p>These are the must-know libraries for 2025 <br>🔗 Full Article : <a href="https://medium.com/@mohamadshahkhajeh/top-php-security-libraries-you-should-know-in-2025-65a54fc6dc8d" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@mohamadshahkhajeh/</span><span class="invisible">top-php-security-libraries-you-should-know-in-2025-65a54fc6dc8d</span></a></p><p><a href="https://phpc.social/tags/PHP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PHP</span></a> <a href="https://phpc.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://phpc.social/tags/DevLife" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevLife</span></a> <a href="https://phpc.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://phpc.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://phpc.social/tags/PHPZen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PHPZen</span></a></p>
WebPerformance Report<p>New on WebPerformance Report: HTTP Observatory 🎉<br>Check your site's HTTP security headers and get clear, actionable results in your inbox.<br>Thanks to the <span class="h-card" translate="no"><a href="https://mozilla.social/@MDN" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MDN</span></a></span> team for their technical guidance. 🙌<br>Because great UX should also be secure.<br>👉 <a href="https://webperformancereport.com/httpo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">webperformancereport.com/httpo</span><span class="invisible"></span></a><br><a href="https://webperf.social/tags/WebPerf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebPerf</span></a> <a href="https://webperf.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://webperf.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
Vasileiadis A. (Cyberkid)<p>Top Web Application PenTesting Tools by Category ⚔️</p><p>🔖Hashtags:<br><a href="https://defcon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://defcon.social/tags/PentestingTools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PentestingTools</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://defcon.social/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://defcon.social/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://defcon.social/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p><p>⚠️Disclaimer:<br>This content is for educational purposes only. Only use these tools in environments where you have proper authorization. Hacking without permission is illegal and unethical.</p>
Vasileiadis A. (Cyberkid)<p>SQL Injection (SQLi) 💉 – Everything You Need to Know</p><p>What is SQL Injection?<br>SQL Injection is a code injection technique that allows attackers to interfere with the queries an application makes to its database.</p><p>Types of SQLi:</p><p>1. In-band SQLi – Most common and easy to exploit.</p><p>2. Blind SQLi – Data isn’t visibly returned but can still be extracted through inference.</p><p>3. Out-of-band SQLi – Uses external servers to get results (less common but powerful).</p><p>4. Time-Based Blind SQLi – Server delay used to infer info from the database.</p><p>Attack Scenarios:<br>▫️Bypassing logins<br>▫️Dumping database contents<br>▫️Modifying or deleting data<br>▫️Escalating privileges<br>▫️Accessing admin panels</p><p>Common SQLi Targets:<br>🔹Login forms<br>🔹Search boxes<br>🔹URL parameters<br>🔹Cookies<br>🔹Contact or feedback forms</p><p>How to Prevent SQLi:<br>▪️Use parameterized queries<br>▪️Employ ORM frameworks<br>▪️Sanitize all user inputs<br>▪️Set least privilege for DB users<br>▪️Use Web Application Firewalls (WAF)</p><p>♦️Red Team Tip<br>Test all user input points, especially where data touches the database. Think beyond login forms—SQLi hides in unexpected places.</p><p>🔖Hashtags:<br><a href="https://defcon.social/tags/SQLInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SQLInjection</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://defcon.social/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://defcon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://defcon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a></p><p>⚠️Disclaimer:<br>This content is for educational purposes only. Always perform security testing with explicit permission. Unauthorized testing is illegal and unethical.</p>
Vasileiadis A. (Cyberkid)<p>Everything About SQL Injection 💉</p><p>What is SQL Injection?<br>SQL Injection is a web vulnerability that lets attackers manipulate database queries. This can lead to unauthorized access, data leaks, or even full control of the system.</p><p>🔬Types of SQL Injection</p><p>1️⃣ Classic SQLi – Injecting raw SQL commands.<br>2️⃣ Blind SQLi – No errors, but the response changes.<br>3️⃣ Time-Based SQLi – Uses response delays to extract data.<br>4️⃣ Union-Based SQLi – Merges malicious queries with valid ones.<br>5️⃣ Out-of-Band SQLi – Exfiltrates data through DNS, HTTP, etc.</p><p>♦️Potential Impact<br>▫️Access &amp; dump sensitive data<br>▫️Bypass login systems<br>▫️Alter or delete database entries<br>▫️Full system compromise</p><p>🔰Common Entry Points<br>▫️Login forms<br>▫️Search inputs<br>▫️Contact forms<br>▫️URL query parameters</p><p>Defense Strategies 🛡<br>✅ Use parameterized queries<br>✅ Validate &amp; sanitize inputs<br>✅ Apply least privilege to DB accounts<br>✅ Monitor logs for anomalies<br>✅ Perform regular security audits</p><p>📀Image Description (for visual):<br>🔹A sleek cyber-themed layout with:<br>🔹A hacker icon injecting code<br>🔹A login form being exploited<br>🔹Database icons showing exposed data<br>🔹A shield labeled “Prepared Statements” blocking the attack</p><p>🔖Tags<br><a href="https://defcon.social/tags/SQLInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SQLInjection</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://defcon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://defcon.social/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://defcon.social/tags/DatabaseSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DatabaseSecurity</span></a> <a href="https://defcon.social/tags/HackerTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerTips</span></a></p><p>⚠️Disclaimer<br>This content is for educational and ethical purposes only. Do not attempt to exploit vulnerabilities without proper authorization. Always follow legal and ethical guidelines when testing or learning about cybersecurity.</p>
LavX News<p>The Dual Edge of CDNs: Speed and Security in the Digital Age</p><p>Content Delivery Networks (CDNs) are the backbone of fast and reliable web experiences, but they also introduce unique security vulnerabilities. This article dives deep into how CDNs work, their benef...</p><p><a href="https://news.lavx.hu/article/the-dual-edge-of-cdns-speed-and-security-in-the-digital-age" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/the-dual-</span><span class="invisible">edge-of-cdns-speed-and-security-in-the-digital-age</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.cloud/tags/ContentDeliveryNetwork" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ContentDeliveryNetwork</span></a> <a href="https://mastodon.cloud/tags/SubresourceIntegrity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SubresourceIntegrity</span></a></p>
LavX News<p>Combatting AI Scraping: The Rise of Go-Away for Enhanced Web Security</p><p>As AI scraping becomes increasingly sophisticated, web developers are turning to innovative solutions like Go-Away. This self-hosted tool provides a robust defense against low-effort mass scraping, em...</p><p><a href="https://news.lavx.hu/article/combatting-ai-scraping-the-rise-of-go-away-for-enhanced-web-security" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/combattin</span><span class="invisible">g-ai-scraping-the-rise-of-go-away-for-enhanced-web-security</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.cloud/tags/WebScraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebScraping</span></a> <a href="https://mastodon.cloud/tags/GoAway" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoAway</span></a></p>
Miguel Afonso Caetano<p>"When Let’s Encrypt, a free certificate authority, started issuing 90 day TLS certificates for websites, it was considered a bold move that helped push the ecosystem towards shorter certificate life times. Beforehand, certificate authorities normally issued certificate lifetimes lasting a year or more. With 4.0, Certbot is now supporting Let’s Encrypt’s new capability for six day certificates through ACME profiles and dynamic renewal at:</p><p> - 1/3rd of lifetime left<br> - 1/2 of lifetime left, if the lifetime is shorter than 10 days"</p><p><a href="https://www.eff.org/deeplinks/2025/04/certbot-40-long-live-short-lived-certs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eff.org/deeplinks/2025/04/cert</span><span class="invisible">bot-40-long-live-short-lived-certs</span></a></p><p><a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://tldr.nettime.org/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://tldr.nettime.org/tags/Certbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Certbot</span></a> <a href="https://tldr.nettime.org/tags/LetsEncrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LetsEncrypt</span></a></p>
LavX News<p>Google Chrome 136: A Game-Changer in Browser Privacy with :visited Link Partitioning</p><p>After two decades of privacy vulnerabilities, Google Chrome 136 is set to revolutionize user security by addressing a critical flaw that allowed websites to track browsing history through styled links...</p><p><a href="https://news.lavx.hu/article/google-chrome-136-a-game-changer-in-browser-privacy-with-visited-link-partitioning" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/google-ch</span><span class="invisible">rome-136-a-game-changer-in-browser-privacy-with-visited-link-partitioning</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.cloud/tags/PrivacyProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyProtection</span></a> <a href="https://mastodon.cloud/tags/Chrome136" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome136</span></a></p>
Florian Bierhoff<p>Na endlich! Mit <a href="https://internet-standards.de" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">internet-standards.de</span><span class="invisible"></span></a> existiert nun eine deutschsprachige Instanz von <span class="h-card" translate="no"><a href="https://mastodon.nl/@internet_nl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>internet_nl</span></a></span> mit der man prüfen kann, ob Web- und Mail-Server moderne Sicherheits-Standards erfüllen :green_i: </p><p><a href="https://dreistrom.land/loesungen/internet-standards" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dreistrom.land/loesungen/inter</span><span class="invisible">net-standards</span></a></p><p><a href="https://infosec.exchange/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://infosec.exchange/tags/MailSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MailSecurity</span></a></p>
Chris Woody Woodruff<p>htmx makes Razor Pages more interactive—but don’t skip the security checklist. From CSRF protection to request validation, here’s how to keep your htmx apps locked down: <a href="https://woodruff.dev/keeping-your-htmx-apps-safe-security-best-practices-for-asp-net-developers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">woodruff.dev/keeping-your-htmx</span><span class="invisible">-apps-safe-security-best-practices-for-asp-net-developers/</span></a></p><p><a href="https://mastodon.social/tags/htmx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>htmx</span></a> <a href="https://mastodon.social/tags/ASPNETCore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASPNETCore</span></a> <a href="https://mastodon.social/tags/RazorPages" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RazorPages</span></a> <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.social/tags/DevTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevTips</span></a> <a href="https://mastodon.social/tags/SecureCoding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureCoding</span></a></p>
halil deniz<p>SQL Injection Cheat Sheet: A Comprehensive Guide<br><a href="https://denizhalil.com/2025/04/02/sql-injection-cheat-sheet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">denizhalil.com/2025/04/02/sql-</span><span class="invisible">injection-cheat-sheet/</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a> <a href="https://mastodon.social/tags/sql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sql</span></a> <a href="https://mastodon.social/tags/sqlinjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sqlinjection</span></a> <a href="https://mastodon.social/tags/webapplicationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webapplicationsecurity</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/blogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blogger</span></a></p>