All Auth0 Blog
- Cybersecurity
The Hacker Mindset
- Ktor
Creating an HTTP API with Ktor and Kotlin
- Python
How to Make a Twitter Bot in Python using Tweepy
- Data Breach
The Worst Data Breaches of 2021 (Q1 and Q2)
- 2FA
The Working Principles of 2FA (2-Factor Authentication) Hardware
Why hardware-based Two-Factor Authentication makes the user much more secure over other multi-factor alternatives
- Zappa
Deploying Django RESTful APIs as Serverless Applications with Zappa
Learn how to develop a serverless Django API, deploy it to AWS using Zappa, and secure it with Auth0.
- .NET
Permission-Based Security for ASP.NET Web APIs
Checking user permissions allows you to have more control over access to your ASP.NET Web API.
- Attack Prevention
What Is Password Spraying? How to Stop Password Spraying Attacks
Password spraying attacks can cause major data breaches. Here’s how to prevent them from doing so.
- Digital Currency
101 Smart Contracts and Decentralized Apps in Ethereum
Smart contracts are a new way to build decentralized applications in a Blockchain.
- API
What Is an API? How APIs Work (for Non-Developers)
Learn how APIs can accelerate software development and delivery.
- 2FA
The Working Principles of 2FA (2-Factor Authentication) Software
With modern computers capable of testing millions of password combinations per second, securing your online accounts with only a password may not be sufficient anymore.
- Python
How to Handle JWTs in Python
- Spring Boot
Spring Boot Caching 101