Which symbols can I whitelist to remain safe against SQL injection, XSS, and all other injections attacks?

I have an input field in a web that is being saved. This field can be shown in other systems that I do not have control over and that’s why I would like to limit what is allowed in this field, although I would like to allow s… Continue reading Which symbols can I whitelist to remain safe against SQL injection, XSS, and all other injections attacks?

Is web application connected to a database via an application server more secure?

I have heard from my colleagues and some other people on web suggest that it is more secure to run this configuration:

Web server -> Application server -> Database, than this:

Web server -> Database

The reasons th… Continue reading Is web application connected to a database via an application server more secure?

Why attack detection based on the same user request from different places (e.g. by IP) is not widely used?

There are many ways how an adversary can pretend that he is a legitimate user (like session cookie stealing, bruteforcing the password and what not), but as far as I can see it should be rather hard for them to go unnoticed i… Continue reading Why attack detection based on the same user request from different places (e.g. by IP) is not widely used?