Auriga AristoinXTra Mile DevelopmentBest Practices for Secure and Scalable ApplicationsExplore the Optimal Methods for Storing Configuration Settings and Keys1d ago
Krzysztof PranczkinITNEXTDetecting Banker Malware Installed on Android DevicesThis article presents mechanisms and ideas for detecting malicious applications installed on Android devices that abuse the…Mar 202
cyb3rninj4Thick Client Security Testing: The Essential GuideIn this blog, we will discuss what are — Thick client applications, an overview of them, and my approach to testing thick client…Jul 22, 20231Jul 22, 20231
Chandan BhattacharyainCyber Security AdvocacyApplication Security Engineering — A primerAn article that outlines the need for Application Security engineering and approach to engineer an Application Security Infrastructure.2d ago2d ago
Krzysztof PranczkinITNEXTIntroduction to Security in SDLC with SAST for Developers and Security EngineersIn today’s landscape, automation plays a crucial role in various development activities, ranging from ensuring code quality and performing…Feb 23Feb 23
Auriga AristoinXTra Mile DevelopmentBest Practices for Secure and Scalable ApplicationsExplore the Optimal Methods for Storing Configuration Settings and Keys1d ago
Krzysztof PranczkinITNEXTDetecting Banker Malware Installed on Android DevicesThis article presents mechanisms and ideas for detecting malicious applications installed on Android devices that abuse the…Mar 202
cyb3rninj4Thick Client Security Testing: The Essential GuideIn this blog, we will discuss what are — Thick client applications, an overview of them, and my approach to testing thick client…Jul 22, 20231
Chandan BhattacharyainCyber Security AdvocacyApplication Security Engineering — A primerAn article that outlines the need for Application Security engineering and approach to engineer an Application Security Infrastructure.2d ago
Krzysztof PranczkinITNEXTIntroduction to Security in SDLC with SAST for Developers and Security EngineersIn today’s landscape, automation plays a crucial role in various development activities, ranging from ensuring code quality and performing…Feb 23
Christophe LimpalairBypass admin login with SQL Injections (sqlmap)As a popular request, let’s see how we can use SQL injections to bypass vulnerable login pages without needing a valid username or…Oct 6, 20212
Osama OkunboThreat Modeling: Anticipating and Outmaneuvering Security RisksWhy Threat Modeling Matters: Threat modeling isn’t just another security exercise; it’s like preparing for a chess game, where you think…1d ago
Florian WalterThe Easiest Way to Find CVEs at the Moment? GitHub Dorks!In this article, I will demonstrate how I used GitHub dorks to find 24 vulnerabilities in popular open-source projects in just a few weeks…Feb 86