Security Articles & Guides
Explore our comprehensive collection of security articles, how-to guides, and best practices
•Ahmad Sadeddin
Spring Boot Security Best Practices 2025
Comprehensive guide to implementing security best practices in Spring Boot applications in 2025, covering HTTPS/TLS, CSRF protection, input validation, authentication, and more.
spring-boot
java
security
best-practices
web-development
•Ahmad Sadeddin
Express Security Best Practices 2025
Comprehensive guide to securing Express.js applications with up-to-date best practices for 2025, covering authentication, input validation, XSS prevention, CSRF protection, and more.
express
security
nodejs
web-development
authentication
csrf
xss
•Ahmad Sadeddin
Rust Security Best Practices 2025
Comprehensive guide to writing secure Rust code in 2025, covering type safety, unsafe code, input validation, dependency management, and more.
rust
security
best-practices
programming
•Ahmad Sadeddin
Flask Security Best Practices 2025
Comprehensive guide to securing Flask applications with up-to-date best practices for 2025, covering authentication, input validation, XSS prevention, CSRF protection, and more.
flask
security
python
web-development
authentication
csrf
xss
•Ahmad Sadeddin
Must have Cursor rules for TypeScript developers
A comprehensive list of cursor rules that every typescript developer should include
security
best-practices
cursor
cursor-rules
•Ahmad Sadeddin
Next.JS Security Best Practices - 2025
A comprehensive guide to securing your Next.JS applications
security
best-practices
next.js
javascript
•Ahmad Sadeddin
Javascript Security Best Practices
A comprehensive guide to securing your Javascript applications
security
best-practices
javascript
•Yutaka Hasoai
Secure Coding in Ruby on Rails
A comprehensive guide to securing your Ruby on Rails applications
security
best-practices
ruby
rails
•Ahmad Sadeddin
Golang Security Best Practices
A comprehensive guide to securing your Go applications
security
best-practices
golang
•Ahmad Sadeddin
What's MITRE and What's Going On?
What happened? A guide for everyone.
MITRE
CVE
CWE
application-security
•Ahmad Sadeddin
SAST vs DAST: Which One Fits Your Application Security Needs?
Understanding the differences between Static and Dynamic Application Security Testing
security
SAST
DAST
application-security
testing