PinnedChetan ConikeeSupply Chain Attacks: The Sequel — Starring XZ-utils as SolarWinds’ UnderstudyAh, the XZ backdoor hack — yet another delightful reminder that when it comes to supply chain attacks, we just can’t seem to catch a break…Apr 5Apr 5
Chetan ConikeeThe Falcon’s Folly: CrowdStrike’s High-Stakes Gamble with SpeedIn the relentless world of cybersecurity, where threats evolve at lightning speed, even the mightiest can stumble. This is the tale of how…Jul 25Jul 25
Chetan ConikeeSeries — Discovering Business Logic FlawsAct 7— One (Bug)Mac please!Mar 20, 2019Mar 20, 2019
Chetan ConikeeExploiting Business Logic Flaws in ApplicationI just completed a small series of blog posts that were somewhat related in substance and topic set. The topic is “Discovering Business…Mar 19, 2019Mar 19, 2019
Chetan ConikeeSeries — Discovering Business Logic FlawsAct 6— Your data has been breached, now what?Mar 15, 2019Mar 15, 2019
Chetan ConikeeSeries — Discovering Business Logic FlawsAct 5— Pusher in Coinbase cookieMar 15, 2019Mar 15, 2019
Chetan ConikeeSeries — Discovering Business Logic FlawsAct 3 — The dynamic duo Andrew and Allen exploit Nordstorm with their FatWalletMar 15, 2019Mar 15, 2019
Chetan ConikeeSeries — Discovering Business Logic FlawsAct 2— Attack like its 1999Mar 15, 2019Mar 15, 2019
Chetan ConikeeSeries — Discovering Business Logic FlawsAct 1 — What is a business logic flaw?Mar 15, 2019Mar 15, 2019