<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<atom:link href="https://devnet.kentico.com/rss/authors/370870" rel="self" type="application/rss+xml"/>
<title><![CDATA[DevNet Author Profile]]></title>
<link><![CDATA[https://devnet.kentico.com/rss/authors/370870]]></link>
<description><![CDATA[Including Articles and Video Articles]]></description>
<language><![CDATA[en-US]]></language>
<item>
     <title><![CDATA[Kentico unsupported versions might be at risk]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[<p>In recent days, we have been informed by several customers that their (unsupported) Kentico instances have been compromised by advertisement malware. Our strong recommendation is to keep your instances updated. Based on the <a class="css-tgpl01" data-renderer-mark="true" href="https://www.kentico.com/platform/roadmap/product-support-lifecycle" title="https://www.kentico.com/platform/roadmap/product-support-lifecycle">Product Support Lifecycle Policy</a>, Kentico regularly releases security patches for Kentico 12, Kentico Xperience 13 and Xperience by Kentico. If your website is built on an older version (e.g. Kentico 8 - Kentico 11) then you could be a potential target for attackers.</p>
]]></description>
     <pubDate>Fri, 02 Dec 2022 08:29:58 GMT</pubDate>
      <documenttags><![CDATA[]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/kentico-unsupported-versions-might-be-at-risk?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[Kentico Xperience Private Bug Bounty Program]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[<p data-renderer-start-pos="1">Today we&#39;re really excited to announce the opening of the Kentico Xperience Private Bug Bounty Program.</p>
]]></description>
     <pubDate>Wed, 23 Feb 2022 12:00:00 GMT</pubDate>
      <documenttags><![CDATA[]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/kentico-xperience-private-bug-bounty-program?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[TLS 1.2 support]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[<p>Since SSL is considered an outdated technology and may be subject to security vulnerabilities in the future, it is strongly recommended to use TLS v1.1 or newer if possible.</p>
]]></description>
     <pubDate>Thu, 31 Mar 2016 14:00:00 GMT</pubDate>
      <documenttags><![CDATA[security, tls, paypal]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/tls-1-2-support?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[Protection against Cross-site request forgery (CSRF, XSRF)]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[<p>Cross-site request forgery (CSRF) is one of the most common web&nbsp;applications&nbsp;vulnerabilities. In 2013 it was ranked number 8 in <a href="https://www.owasp.org/index.php/Top_10_2013-Top_10" target="_blank">OWASP&rsquo;s TOP 10 document</a>. In this article I am going to explain what is the CSRF vulnerability and the available protection methods.</p>
]]></description>
     <pubDate>Wed, 25 Mar 2015 15:00:00 GMT</pubDate>
      <documenttags><![CDATA[security, csrf, xsrf, "cross-site request forger"]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/protection-against-cross-site-request-forgery-(csrf-xsrf)?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[Security - Avoiding SQL Injection (SQLi)]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[<p>SQL injection is one of the most dangerous threats against web applications. Therefore, it is really important to pay extra attention to avoiding SQL injection. Every successful attack may compromise sensitive data or lead to privilege escalation.</p>
]]></description>
     <pubDate>Wed, 03 Dec 2014 12:30:23 GMT</pubDate>
      <documenttags><![CDATA["sql injection", security, sqli, kentico]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/security-avoiding-sql-injection-(sqli)?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[Security - Avoiding Cross-site Scripting (XSS)]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[<p>In this article I will describe how cross-site scripting (XSS) works and how to write secure code to avoid this vulnerability. <a href="https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)" target="_blank">OWASP pages</a> classify cross-site scripting as a high severity vulnerability. XSS is also one of the most frequently exploited vulnerabilities in web applications.</p>
]]></description>
     <pubDate>Wed, 26 Nov 2014 11:53:37 GMT</pubDate>
      <documenttags><![CDATA[xss, security, kentico, "cross-site scripting", css]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/security-avoiding-cross-site-scripting-(xss)?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[Page macro expressions security]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[The macro engine is a powerful option you can use when developing your web project. Page macros are just one part of this engine. Since changes have been made to the page macro&rsquo;s security in hotfix 8.1.11, this article will primarily focus on page macro expressions and the appropriate security check you should be aware of.]]></description>
     <pubDate>Thu, 06 Nov 2014 15:53:47 GMT</pubDate>
      <documenttags><![CDATA[security, macros]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/page-macro-expressions-security?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[New version of Windows Azure deployment script]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[We have updated our deployment script with new cmdlets included in the latest Windows Azure Powershell (May 2013). If you want to know what&rsquo;s new, please read my short blog post.<br />
]]></description>
     <pubDate>Thu, 30 May 2013 04:06:43 GMT</pubDate>
      <documenttags><![CDATA[script]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/new-version-of-windows-azure-deployment-script?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[Security improvements in Kentico CMS 7]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[<p>We at Kentico take the security of our product very seriously. That&rsquo;s why we implement security improvements into every new version. Kentico CMS 7 is not an exception, so let&lsquo;s take a look at what&rsquo;s new.</p>
]]></description>
     <pubDate>Thu, 17 May 2012 06:40:30 GMT</pubDate>
      <documenttags><![CDATA[cms, kentico, "kentico cms 7", security]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/security-improvements-in-kentico-cms-7?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

<item>
     <title><![CDATA[Windows Azure deployment script on Kentico Marketplace]]></title>
     <author>Juraj Komlosi</author>
     <description><![CDATA[Using this PowerShell script, you can easily deploy a Kentico CMS website to Windows Azure. You only have to do three easy steps and run the script.]]></description>
     <pubDate>Sun, 29 Apr 2012 23:51:15 GMT</pubDate>
      <documenttags><![CDATA[marketplace, powershell, script, "windows azure"]]></documenttags>
     <link><![CDATA[https://devnet.kentico.com/articles/windows-azure-deployment-script-on-kentico-marketplace?feed=ccaebdb2-fa45-4245-8590-3d04b730592e]]></link> 	  
</item>

</channel>
</rss>
