Avoid Security Configuration Errors
Now that our server won’t fall to the first script kiddie that comes along, let’s make sure we won’t make errors configuring our software stack. Breaches due to misconfiguration are more common than those due to zero-day vulnerabilities.
What Is a Zero-Day Vulnerability? | |
---|---|
Some software bugs let attackers remotely execute commands on targeted machines. Although software developers quickly release patches as soon as these issues are found, sometimes attackers find the bugs first. Zero-day vulnerabilities are bugs attackers are using before the software developer has the chance to fix them. Zero days have passed ... |
Get Secure Your Node.js Web Application now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.