Month: February 2024
Cross-Site-Request-Forgery mitigation techniques
Learn how CSRF attacks work and how to stop them. Also covers which requests are considered to be same-site and same-origin.
on Software Engineering
Learn how CSRF attacks work and how to stop them. Also covers which requests are considered to be same-site and same-origin.