I came across this interesting code challenge by Intigriti. If you don’t already…
According to CISA, 90% of successful cyber attacks start when you click an unfamiliar link or…
Software Quality Assurance and IT-Security are important aspects of modern software development which in practice…
During my second week at Spring there was a Capture The Flag (CTF) event. In this case the…
So, where do we research what the top attack vectors are? Who defines that? I started by…