Request forgeries (CSRF, XSRF, SSRF)
In 2020, CheckPoint Research announced multiple vulnerabilities in the popular social media application named TikTok. One of the found vulnerabilities allowed an attacker to delete…
In 2020, CheckPoint Research announced multiple vulnerabilities in the popular social media application named TikTok. One of the found vulnerabilities allowed an attacker to delete…
What if you could take multiple senior developers and security experts, distill them into a tool, and then have the ability to run that tool…
Proxy servers are a topic that you can expect to get quizzed on in the CompTIA Security+ exam. To make sure you can answer questions…
Vault is an open-source secrets management tool used to automate access to secrets, data, and systems. This blog post comes from our Explained in 180…
According to both OWASP and CWE, Cross-Site Scripting is one of the top 10 most dangerous web application security risks, and for good reason: OWASP’s…
A lot of times, especially when you join smaller organizations, there are no (or very few) formal processes in place. The approach taken to secure…
We’ve talked about what SQL is, but now, let’s talk about one of the most common and dangerous web-based attacks: SQL injections (aka SQLi). In…
One of the most commonly found flaws in web applications and mobile applications is information leakage. But what is information leakage, why is it a…
It should come as no surprise that WordPress has a massive target on its back given how popular a platform it has become. To add…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.