Skip to content
GeekWire
  • Home
  • News
    • Cyber Threats
    • Dark Web
    • Hacking
    • IoT
    • Malware
    • OS
    • Vulnerability
  • Security
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Archives
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • Home
  • News
    • Cyber Threats
    • Dark Web
    • Hacking
    • IoT
    • Malware
    • OS
    • Vulnerability
  • Security
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Archives
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

JWT

Security Token Basics: Part 1 How to Launch an STO

11 November 2019

Your roadmap to launching your own STO We have classified the process to launch a security token offering into three parts: Basics of …

Tags Basics, Ethereum, How, ICO, JWT

Authentication and Authorization: Mastering Security

25 October 2019

Don’t be this paranoid… but maybe be a little paranoid In this edition of “Best of …

Tags .NET, APIs, Asp .Net, Frameworks, JWT

A Simple MicroProfile JWT Token Provider With Payara Realms and JAX-RS

11 October 2019

In this tutorial, I will demonstrate how to create a “simple” (yet practical) token provider using Payara realms as users/groups …

Tags Jakarta Ee, JWT, Microprofile, Providers, Simple

Deep Dive Into OAuth2.0 and JWT (Part 2 OAuth2.0)

10 October 2019

In the previous article, we introduced Authentication and Authorization. In this article, let us have a look at one of the most commonly …

Tags Authentication, Authorization, Deep Dive, JWT, Oauth 2.0

All You Need to Know About User Session Security

24 September 2019

Don’t let this be your users What follows is a two-part series on session management  —  inspired by extensive conversations with …

Tags About, Access Tokens, Cookies, JWT, Open Source

Column Level Encryption in GCP

16 September 2019

Column level encryption allows users to select specific information or attributes to be encrypted instead of encrypting an entire database. …

Tags Columns, Data Encryption, Encryption, GCP, JWT

Custom JWT Generator in WSO2 API Manager

13 August 2019

This is yet another article on generating custom JWT in WSO2 API Manager. For details please read the official …

Tags Customs, Generators, Json, JWT, Wso2 Api Manager

Spring Security in Action

30 May 2019

Spring Security is a highly customizable authentication and access-control framework for Java applications, especially for Spring-based …

Tags Actions, Api, Java, Json, JWT, Programming, Programming Languages, Rest Apis, Spring

JWT Token: Lightweight, Token-Based Authentication

29 May 2019

Securing your website is the goal of every developer. As of now, there are many possible ways to deal with website …

Tags Authentication, Claims, JWT, Keys, Lightweight, Payloads, Private, Public, Signatures

Spring Boot Security + JSON Web Token (JWT) ”Hello World” Example

24 May 2019

In this tutorial, we will be developing a Spring Boot application that makes use of JWT authentication for securing an exposed REST API. In …

Tags Examples, Hello World, JWT, Spring Boot, Tokens, Web
Post navigation
Older posts
1 2 … 4 Next →
+ More

NVD

CVE-2014-4913 – ZF2014-03 has a potential cross site scripting vector in multiple view helpers …

15 December 2019

CVE-2014-8561 – imagemagick 6.8.9.6 has remote DOS via infinite loop …

15 December 2019

CVE-2014-8650 – python-requests-Kerberos through 0.5 does not handle mutual authentication …

15 December 2019

CVE-2019-19807 – In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erron …

15 December 2019

CVE-2019-19797 – read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write. …

15 December 2019

EXPLOITS

FTP Commander Pro 8.03 – Local Stack Overflow

13 December 2019

NVMS 1000 – Directory Traversal

13 December 2019

Bullwark Momentum Series JAWS 1.0 – Directory Traversal

12 December 2019

OpenNetAdmin 18.1.1 – Command Injection Exploit (Metasploit)

12 December 2019

Lenovo Power Management Driver 1.67.17.48 – ‘pmdrvs.sys’ Denial of Service (PoC)

12 December 2019

SECURELIST

Kaspersky Security Bulletin 2019. Statistics

12 December 2019

Story of the year 2019: Cities under ransomware siege

11 December 2019

Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium

10 December 2019

APT review: what the world’s threat actors got up to in 2019

4 December 2019

Corporate security prediction 2020

3 December 2019

Information Cyber Network Enterprise Security News

© 2019 GeekWire | Privacy Policy | We are not responsible for the content of external sites.
Scroll back to top
We use cookies to make the site simpler. Please let us know if you agree our Privacy Policy including cookie policy.Yes, I agree