March 28, 2023, 1:35 p.m. | Jeremiah Talamantes

InfoSec Write-ups - Medium infosecwriteups.com

Attacking the Authenticated User

Photo credit: Computerworld 2018

Today, we’re going to dive into a fascinating topic in the realm of cybersecurity: Cross-Site Request Forgery, or CSRF for short. Have you ever wondered how malicious actors can exploit a user’s authenticated session to perform unauthorized actions on their behalf? That’s CSRF in action, and it’s as sneaky as it sounds.

So, what exactly is CSRF? In simple terms, it’s a type of attack where an unsuspecting user is tricked into …

code csrf cybersecurity exploitation exploits php takedown web

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Systems Security Officer (ISSO) (Remote within HR Virginia area)

@ OneZero Solutions | Portsmouth, VA, USA

Security Analyst

@ UNDP | Tripoli (LBY), Libya

Senior Incident Response Consultant

@ Google | United Kingdom

Product Manager II, Threat Intelligence, Google Cloud

@ Google | Austin, TX, USA; Reston, VA, USA

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India