mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#websecurity

4 Beiträge4 Beteiligte0 Beiträge heute

Enhance Your Drupal Website Security with Two-Factor Authentication (2FA)
Boost your Drupal site's security with Two-Factor Authentication (2FA). Protect your admin login from unauthorized access using time-based OTPs, SMS, or authenticator apps. Learn how to integrate and configure the best 2FA modules for Drupal and safeguard sensitive user data. Ideal for developers, site admins, and anyone serious about cybersecurity.

kbizsoft.com/set-up-2fa-authen

#Drupal#2FA#WebSecurity

A strict-looking content security policy isn’t always a secure one.

During a recent engagement, we came across a policy that had all the right bits on paper including nonces, locked-down sources, and everything you'd expect.

But one missing directive "base-uri" was all it took to break it wide open.

By injecting a <base> tag, we redirected script loading to an attacker-controlled domain. XSS payload delivered. CSP bypassed.

CSPs need more than checkboxes. They need context, testing, and attention to the small stuff.

📌Here’s what went wrong and how to avoid it: pentestpartners.com/security-b

#CyberSecurity#AppSec#CSP

✨🔒 Take your web security to the next level with NPMplus and CrowdSec!

Check out this step-by-step tutorial written by CrowdSec community member Zoey, which demonstrates how to set up NPMplus (the enhanced version of the standard NGINX Proxy Manager) with CrowdSec.

Follow the tutorial here 👉 crowdsec.net/blog/web-server-s

crowdsec.netEnhancing Web Server Security with NPMplus and CrowdSecLearn how to enhance your web server security using NPMplus as a Remediation Component for the CrowdSec Security Engine.

Durch eine absurde Erfahrung mit der #Sparkasse suche ich nach #BullshitBingo Karten zum Thema #Security (#WebSecurity)

Bisher:
- Einmalcodes per #SMS
- Proprietäre #TOTP App statt offener Standards
- Support nur per Telefon
- Username und Passwort laut durchsagen
- Apps nach 5 Minuten von selber sperren
- Apps nach 3 Monaten ohne Login sperren, ohne Errorcode oder auffindbare Onlinehilfe ("90 Tage")
- App neu installieren, um Problem zu lösen (#TOFU)

Fällt euch noch was ein?