The Debricked Blog

Welcome to our corner of the internet. Here we share insights, news, best-practices and behind the scenes stories

Security

What is a security weakness?

The terms threat, vulnerability and weakness are often used in cybersecurity. Understanding the difference between these terms is important. It allows organizations to correctly implement,

Read More »
Security

What is a security threat?

The terms threat, vulnerability and weakness are often used in cybersecurity. Understanding the difference between these terms is important. It allows organizations to correctly implement,

Read More »
Security

What is a security vulnerability?

The terms threat, vulnerability and weakness are often used in cybersecurity. Understanding the difference between these terms is important. It allows organizations to correctly implement,

Read More »
JSON
Events

CTF: JSON Web Tokens (JWT)

Vulnerabilities in JWT libraries JSON Web Tokens (JWTs) are commonly used for authorization purposes, since they provide a structured way to describe a token which

Read More »