Aditya SawantIOS Penetration Testing: Guide to Static AnalysisDuring an iOS application penetration test, a penetration tester utilizes a range of techniques, tools, and methodologies to evaluate the…Apr 23Apr 23
Aditya SawantIDOR Leads To Account TakeoverIDOR, one of the most common vulnerabilities in applications, can lead to major security leaks. Today, I’ll walk you through how I…Apr 72Apr 72
Aditya SawantSupply Chain Attack: XZ Backdoor CVE-2024–3094In the realm of cybersecurity, supply chain attacks represent a particularly insidious threat. These attacks occur when malicious actors…Apr 6Apr 6