Securing Data Pipelines: Privacy, Compliance, And Security-by-Design On AWS
This Blog Post is part of Building and Securing Data Pipelines: From Governance to Secure Implementation Series
This Blog Post is part of Building and Securing Data Pipelines: From Governance to Secure Implementation Series
This Blog Post is part of Building and Securing Data Pipelines: From Governance to Secure Implementation Series
This Blog Post is part of Building and Securing Data Pipelines: From Governance to Secure Implementation Series
This Blog Post is part of Building and Securing Data Pipelines: From Governance to Secure Implementation Series
Description There are various Facebook products like Ads Manager, Business Manager, Messenger Payments, etc. which requires an user to add some payment metho...
The story I came across a note New: Videos in Comments! written by Bob Baldwin who works at Facebook. This note was about Facebook launching it’s new feature...
Description I was able to fool Facebook’s Graph Search and bypass privacy restrictions and extract sensitive information about user’s applications and pages....
App folder being able to post and enumerate files in/of any folder
Description Dropbox offers two Api’s …
unpublished links over graph api
Description The endpoint /me/links is undocumented. We cannot find documentation about how to deal with this endpoint. But combining few api calls we can cre...
videos from video playlists using an user access_token with public_profile permissions
Description The endpoint /{videolist_id}/videos is undocumented. So, we cannot find any real documentation about this on developer’s site. But still using an...
user access_token withOUT manage_pages permissions
Description According to the documentation mentioned here (https://developers.facebook.com/docs/graph-api/reference/v2.3/photo#deleting), app can delete a ph...