Mario CandelaHow cybercriminals attack your companyCyber criminals, driven by financial gain, political motives, or pure malice, use increasingly sophisticated techniques to compromise the…3d ago
Ackermann YuriyPasskeys for decision makersMarketing free guide, for managers, CISOs, CEOs, engineers, and normies.Oct 92
LORYA basic question in security Interview: How do you store passwords in the database?Explained in 3 mins.May 1266May 1266
Hossam AhmedExploiting Auth0 Misconfigurations: A Case Study on Account Linking VulnerabilitiesDuring our comprehensive testing of the application, my friend Kareem AlSadeq (//kareemelsadek.github.io) and I discovered and…2d ago12d ago1
Andrew BloomaninITNEXTContainer Security ScanningKeep your containers vulnerability free and securely configuredSep 223Sep 223
Mario CandelaHow cybercriminals attack your companyCyber criminals, driven by financial gain, political motives, or pure malice, use increasingly sophisticated techniques to compromise the…3d ago
Ackermann YuriyPasskeys for decision makersMarketing free guide, for managers, CISOs, CEOs, engineers, and normies.Oct 92
LORYA basic question in security Interview: How do you store passwords in the database?Explained in 3 mins.May 1266
Hossam AhmedExploiting Auth0 Misconfigurations: A Case Study on Account Linking VulnerabilitiesDuring our comprehensive testing of the application, my friend Kareem AlSadeq (//kareemelsadek.github.io) and I discovered and…2d ago1
Andrew BloomaninITNEXTContainer Security ScanningKeep your containers vulnerability free and securely configuredSep 223
Anshul KumarinBouncin’ and Behavin’ BlogsGoodbye Gmail: The Hard Truth About Why It’s Time for a ChangeThe end of an era.Sep 18179
Rahulkrishnan R PanickerHow i tricked Crypto Trading Site into sending Dangerous email to it’s UsersHow a Simple User-Agent Manipulation in Forgot Password Emails Could Lead to Full Account Takeover and Phishing Attacks1d ago1
Han HELOIR, Ph.D. ☕️inLevel Up CodingOops, the AI Did It Again: A Guide to GenAI Security FailsKey Vulnerabilities From OWASP for LLMs and How to Mitigate ThemSep 172