This is the second part of the series “Introduction to Cross-Site Request Forgery (CSRF)”. Introduction In my previous blog post, I explained the concepts of CSRF, its risk and pointed out the prevention strategies. In this blog, I will be demonstrating the first prevention method, “Synchronizer Token Pattern”. …