Infosec glossary entry

CORS

CORS :
Cross Origin Resource Sharing

CORS, or Cross-Origin Resource Sharing, is a security feature implemented in web browsers that allows or restricts web applications running at one origin (domain) to make requests to resources hosted on a different origin. This is crucial for maintaining the security of web applications, as it prevents malicious sites from accessing sensitive data from another domain without permission. For example, if a web application from "example.com" tries to fetch data from "api.example2.com", CORS policies determine whether this request is allowed or blocked.

When a browser makes a cross-origin request, it sends an HTTP request that includes specific headers indicating the origin of the request. The server at the target origin can then respond with headers that either allow or deny the request based on its CORS configuration. If the server allows the request, the browser will proceed with the data exchange; if not, it will block the request. Understanding CORS is essential for developers working with APIs and web applications, as it directly impacts how resources can be shared and accessed across different domains while ensuring user security.


By jean-christoph

February 24, 2025

webapp, websec

this might interest you as well

Lessons from Sun Tzu’s “The Art of War” in Cybersecurity: Timeless Wisdom or Outdated Tactics?

Introduction Sun Tzu’s "The Art of War" is a legendary strategic treatise written more than 2,500 years ago. Its enduring principles of warfare strategy have transcended military boundaries, influencing disciplines from business management to competitive sports. In today’s digital age, its relevance is increasingly apparent in the cybersecurity landscape, particularly for CISOs of medium-sized enterprises,

Read More

Ransomware Resilience Starts in the Mind: Overcoming Cognitive Biases and Decision-Making Errors in Cybersecurity

Why We Keep Losing Despite Stronger Security Controls Over the past three years, businesses have almost doubled their confidence in cybersecurity—rising from 32% in 2021 to 54% in 2024 (The Global Cost of Ransomware Study, 2025). Despite this, ransomware’s impact has only grown: 40% of affected companies suffered significant revenue losses, 58% experienced operational downtime,

Read More

AI Cyber Security 2025: Key Threats and Essential Strategies for Your Business

Artificial Intelligence is transforming businesses and industries worldwide, but with this transformation comes unprecedented challenges. The recent launch of Cisco AI Defense, a specialized AI security solution, highlights the urgency of securing AI applications. According to Cisco, only 29% of enterprises feel fully prepared to detect and prevent unauthorized manipulations of AI systems. This low

Read More