Image Vulnerability Management Breaking Down the OWASP Top 10: Insecure Design December 17th, 2024 Learn about the different types of insecure design vulnerabilities and how to identify them. Read Now
Image Vulnerability Management Breaking Down the OWASP Top 10: Injection November 21st, 2024 Gain insights into injection vulnerabilities, the different classifications, and potential security bypass techniques. Read Now
Image Vulnerability Management OWASP Top 10: The Risk of Cryptographic Failures October 21st, 2024 Cryptographic failures: what are they and why are they considered so concerning by the OWASP Top 10? Read Now
Image Vulnerability Management Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen October 17th, 2024 The file upload vulnerability type is as broad in scope as the number of different... Read Now
Image How To Find Broken Access Control Vulnerabilities in the Wild September 30th, 2024 Learn the ins and outs of broken access control vulnerabilities and how to find them in your security research. Read Now
Image A Guide To Subdomain Takeovers 2.0 September 25th, 2024 Learn the ins and outs of understanding subdomain configurations with current resources and tools from an expert security researcher. Read Now
Image 100 Hacking Tools and Resources August 20th, 2024 Whether you’ve just started hacking or are a real pro, we’ve created the ultimate list of 100 hacking tools for your toolkit! Read Now
Image Vulnerability Management How a GraphQL Bug Resulted in Authentication Bypass July 29th, 2024 Experienced security researchers explain how a GraphQL bug resulted in authentication bypass — and how to avoid it. Read Now
Image How to Find XSS June 25th, 2024 Security researcher Haoxi Tan breaks down the best practices and tools for finding the different types of XSS vulnerabilities. Read Now