#security
Read more stories on Hashnode
Articles with this tag
Description A malicious actor can gain full control over the user's DOM window object. This can lead to phishing attacks such as fake login prompts or...
I got the feeling that it works on non-SSL web apps, with just IP or unsecured domain names, and also when APP_DEBUG=true on dev or staging. Debug...
Middleware isn't something new. We have been using it in our applications for quite a while now for various usages, from Authentication, to...